xn--anndakredi-yub.net Open in urlscan Pro Puny
anındakredi.net IDN
5.189.161.239  Malicious Activity! Public Scan

Submitted URL: http://xn--anndakredi-yub.net/
Effective URL: https://xn--anndakredi-yub.net/error.html
Submission: On August 17 via api from TR — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 5.189.161.239, located in Nuremberg, Germany and belongs to CONTABO, DE. The main domain is xn--anndakredi-yub.net.
TLS certificate: Issued by R3 on August 12th 2023. Valid for: 3 months.
This is the only time xn--anndakredi-yub.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Denizbank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 4 5.189.161.239 51167 (CONTABO)
3 1
Apex Domain
Subdomains
Transfer
4 xn--anndakredi-yub.net
xn--anndakredi-yub.net
184 KB
3 1
Domain Requested by
4 xn--anndakredi-yub.net 1 redirects xn--anndakredi-yub.net
3 1

This site contains no links.

Subject Issuer Validity Valid
xn--anndakredi-yub.net
R3
2023-08-12 -
2023-11-10
3 months crt.sh

This page contains 1 frames:

Primary Page: https://xn--anndakredi-yub.net/error.html
Frame ID: BE97C34BCAF2F6C263173CA41AF507B2
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://xn--anndakredi-yub.net/ HTTP 301
    https://xn--anndakredi-yub.net/ Page URL
  2. https://xn--anndakredi-yub.net/error.html Page URL

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

184 kB
Transfer

183 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://xn--anndakredi-yub.net/ HTTP 301
    https://xn--anndakredi-yub.net/ Page URL
  2. https://xn--anndakredi-yub.net/error.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://xn--anndakredi-yub.net/ HTTP 301
  • https://xn--anndakredi-yub.net/

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
xn--anndakredi-yub.net/
Redirect Chain
  • http://xn--anndakredi-yub.net/
  • https://xn--anndakredi-yub.net/
55 B
169 B
Document
General
Full URL
https://xn--anndakredi-yub.net/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
5.189.161.239 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
cnt26.cowabi.com
Software
nginx / PHP/7.4.33 PleskLin
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-encoding
br
content-type
text/html; charset=UTF-8
date
Thu, 17 Aug 2023 14:17:03 GMT
server
nginx
x-powered-by
PHP/7.4.33 PleskLin

Redirect headers

Connection
keep-alive
Content-Length
162
Content-Type
text/html
Date
Thu, 17 Aug 2023 14:17:03 GMT
Location
https://xn--anndakredi-yub.net/
Server
nginx
Primary Request error.html
xn--anndakredi-yub.net/
397 B
349 B
Document
General
Full URL
https://xn--anndakredi-yub.net/error.html
Requested by
Host: xn--anndakredi-yub.net
URL: https://xn--anndakredi-yub.net/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
5.189.161.239 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
cnt26.cowabi.com
Software
nginx / PleskLin
Resource Hash
828e7a1a18499a83d7bdfa62617ad915c24e9dbdfd12a178c18acd9f80ccafef

Request headers

Referer
https://xn--anndakredi-yub.net/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-encoding
br
content-type
text/html
date
Thu, 17 Aug 2023 14:17:03 GMT
etag
W/"18d-5d474ac62bc40"
last-modified
Fri, 31 Dec 2021 17:40:57 GMT
server
nginx
x-accel-version
0.01
x-powered-by
PleskLin
xcc.jpeg
xn--anndakredi-yub.net/
183 KB
183 KB
Image
General
Full URL
https://xn--anndakredi-yub.net/xcc.jpeg
Requested by
Host: xn--anndakredi-yub.net
URL: https://xn--anndakredi-yub.net/error.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
5.189.161.239 Nuremberg, Germany, ASN51167 (CONTABO, DE),
Reverse DNS
cnt26.cowabi.com
Software
nginx / PleskLin
Resource Hash
ba6c85733013a895ffb2eae7b89918efb38c1edd0ff19fb7dc30724c6d5d0738

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://xn--anndakredi-yub.net/error.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/116.0.5845.96 Safari/537.36

Response headers

date
Thu, 17 Aug 2023 14:17:03 GMT
last-modified
Fri, 31 Dec 2021 17:40:57 GMT
server
nginx
etag
"61cf40a9-2dc2b"
x-powered-by
PleskLin
content-type
image/jpeg
accept-ranges
bytes
content-length
187435

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Denizbank (Banking)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

xn--anndakredi-yub.net
5.189.161.239
828e7a1a18499a83d7bdfa62617ad915c24e9dbdfd12a178c18acd9f80ccafef
ba6c85733013a895ffb2eae7b89918efb38c1edd0ff19fb7dc30724c6d5d0738