sparka-kundenzentrale.com
Open in
urlscan Pro
45.141.100.100
Malicious Activity!
Public Scan
Submission: On July 30 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on July 28th 2022. Valid for: 3 months.
This is the only time sparka-kundenzentrale.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 45.141.100.100 45.141.100.100 | 48347 (MTW-AS) (MTW-AS) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
16 | 2 |
ASN48347 (MTW-AS, RU)
PTR: ptr.ruvds.com
sparka-kundenzentrale.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
sparka-kundenzentrale.com
sparka-kundenzentrale.com |
2 MB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 613 |
132 KB |
16 | 2 |
Domain | Requested by | |
---|---|---|
14 | sparka-kundenzentrale.com |
sparka-kundenzentrale.com
|
2 | code.jquery.com |
sparka-kundenzentrale.com
|
16 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sparka-kundenzentrale.com R3 |
2022-07-28 - 2022-10-26 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://sparka-kundenzentrale.com/OP0QSXOYMY
Frame ID: 472F174F07CE68378411760DDADBCFF7
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
TAN-Verfahren Aktualisierung | SparkasseDetected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*parbase
- /etc/clientlibs/
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)/jquery-ui(?:\.min)?\.js
- jquery-ui.*\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
OP0QSXOYMY
sparka-kundenzentrale.com/ |
83 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.css
code.jquery.com/ui/1.13.1/themes/base/ |
35 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.min.css
sparka-kundenzentrale.com/etc/clientlibs/myif/master/base/ |
1 MB 1 MB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
internetfiliale.min.js
sparka-kundenzentrale.com/etc/clientlibs/myif/master/base/ |
433 KB 434 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_ini.svg
sparka-kundenzentrale.com/ |
22 KB 22 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spk-logo-mobile.png
sparka-kundenzentrale.com/content/dam/myif/ssk-dessau/work/bilder/logos/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spk-logo-druck.png
sparka-kundenzentrale.com/content/dam/myif/ssk-dessau/work/bilder/logos/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
392x696bb.png
sparka-kundenzentrale.com/ |
59 KB 59 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1640088281840.png
sparka-kundenzentrale.com/content/myif/ssk-dessau/work/filiale/fi/home/siegel/_jcr_content/awards/parsys/award/image.img.png/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1640088282484.png
sparka-kundenzentrale.com/content/myif/ssk-dessau/work/filiale/fi/home/siegel/_jcr_content/awards/parsys/award_1/image.img.png/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.js
code.jquery.com/ui/1.13.1/ |
517 KB 124 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Rg.woff
sparka-kundenzentrale.com/etc/clientlibs/myif/master/base/internetfiliale/fonts/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pictos-if.woff
sparka-kundenzentrale.com/etc/clientlibs/myif/master/base/internetfiliale/fonts/ |
197 KB 198 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sparkasse_web_Bd.woff
sparka-kundenzentrale.com/etc/clientlibs/myif/master/base/internetfiliale/fonts/ |
36 KB 36 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SparkasseHead_web_Rg.woff
sparka-kundenzentrale.com/etc/clientlibs/myif/master/base/internetfiliale/fonts/ |
29 KB 30 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1608194651895.jpg
sparka-kundenzentrale.com/ |
117 KB 117 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)41 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| IF6 function| getQueryParamValue undefined| IF6_lightbox_closeicon_text function| overlayShow function| overlayClose function| focusBankingFormularElement function| toggleClassInRows function| SLURI function| moveBContent object| ifLoginHeaderTimer function| refreshClientTimeout function| refreshServerTimeout undefined| startCountdownLayer function| showCountdownLayer function| updateHeaderLoginIfPresent function| tick function| setSessionTimeout function| countdownShow function| callBreakHtml object| nbfDatePicker object| nbfTanInput function| selectListBoxItem function| editTeaserRef function| pagenav_statistics_send function| pagenav_statistics function| pagenav_scroll function| pagenav_scroll_window function| $ function| jQuery object| myif function| aktualisierung_vorbereitung boolean| bcarouselAttached boolean| mkp_switcher1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sparka-kundenzentrale.com/ | Name: PHPSESSID Value: n6cfr8gbjl2ddk667t28jurvqs |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
sparka-kundenzentrale.com
2001:4de0:ac18::1:a:1b
45.141.100.100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