metalo.duckdns.org
Open in
urlscan Pro
161.97.76.194
Malicious Activity!
Public Scan
Submission: On June 30 via manual from DK — Scanned from DK
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 24th 2022. Valid for: 3 months.
This is the only time metalo.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MitID (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 161.97.76.194 161.97.76.194 | 51167 (CONTABO) (CONTABO) | |
13 | 2 |
ASN51167 (CONTABO, DE)
PTR: vmi867828.contaboserver.net
metalo.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
duckdns.org
metalo.duckdns.org |
885 KB |
0 |
mitid.dk
Failed
www.mitid.dk Failed |
|
13 | 2 |
Domain | Requested by | |
---|---|---|
5 | metalo.duckdns.org |
metalo.duckdns.org
|
0 | www.mitid.dk Failed |
metalo.duckdns.org
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
metalo.duckdns.org cPanel, Inc. Certification Authority |
2022-06-24 - 2022-09-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://metalo.duckdns.org/mitservice/
Frame ID: D78414D4AF406C3B2BE27C4E45B80941
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
MitIDDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
metalo.duckdns.org/mitservice/ |
50 KB 51 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
metalo.duckdns.org/mitservice/MitID%20login_files/ |
152 KB 152 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site.css
metalo.duckdns.org/mitservice/MitID%20login_files/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrapper.26b008a325cc6885436a.js
metalo.duckdns.org/mitservice/MitID%20login_files/ |
159 KB 160 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
coreclient.38aa143e5793d1fc8eac.js
metalo.duckdns.org/mitservice/MitID%20login_files/ |
520 KB 520 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Bold.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-SemiBold.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Medium.woff2
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Medium.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-Bold.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans-SemiBold.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
IBMPlexSans.woff
www.mitid.dk/assets/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Bold.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-SemiBold.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Medium.woff2
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Medium.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-Bold.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans-SemiBold.woff
- Domain
- www.mitid.dk
- URL
- https://www.mitid.dk/assets/fonts/IBMPlexSans.woff
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MitID (Government)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| n function| a0y function| a0S function| v function| InitializeCoreClient object| f function| a1y function| a1S object| regeneratorRuntime object| mitid function| initializeCore0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
16 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
metalo.duckdns.org
www.mitid.dk
www.mitid.dk
161.97.76.194
2809021359ddf84638f95e626203b2714d650fb4f0f7bb2da6211359f9ca3fb7
4693ddfa1eecb0bdb3f331987468f950786366db35fab54c97e07371ea30b235
73b0fbc60aaab1303d8cd7d1af5b696241e6560a27f8687f2af9c0fb868748b0
ae576713bc196098f7438dede6ff1f835a23291c32b745ad7e6fb6db809a719b
df1d21812a55eb0762be5a831438b77ea67623f203337a901cc36695d105c357