www.dbs.comm.sg.viral221.com Open in urlscan Pro
204.11.59.118  Malicious Activity! Public Scan

URL: https://www.dbs.comm.sg.viral221.com/
Submission: On June 11 via automatic, source openphish — Scanned from SG

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 204.11.59.118, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is www.dbs.comm.sg.viral221.com.
TLS certificate: Issued by R3 on June 9th 2023. Valid for: 3 months.
This is the only time www.dbs.comm.sg.viral221.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DBS Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 204.11.59.118 46606 (UNIFIEDLA...)
1 2
Apex Domain
Subdomains
Transfer
1 viral221.com
www.dbs.comm.sg.viral221.com
4 MB
1 1
Domain Requested by
1 www.dbs.comm.sg.viral221.com
1 1

This site contains no links.

Subject Issuer Validity Valid
webmail.viral221.com
R3
2023-06-09 -
2023-09-07
3 months crt.sh

This page contains 2 frames:

Primary Page: https://www.dbs.comm.sg.viral221.com/
Frame ID: 850FB59D2F0EADFCA541788C232CBB16
Requests: 4 HTTP requests in this frame

Frame: data://truncated
Frame ID: A5D8E63C51E0D3834C5CDFC447F9016B
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

DBS iBanking

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

4527 kB
Transfer

8287 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.dbs.comm.sg.viral221.com/
6 MB
4 MB
Document
General
Full URL
https://www.dbs.comm.sg.viral221.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
204.11.59.118 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
204-11-59-118.unifiedlayer.com
Software
Apache /
Resource Hash
86e5ad280a00355550a73502dc92d7cb3dccfb85453c9d3b6e44ffa0b5894d58

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36
accept-language
zh-SG,zh;q=0.9

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Sun, 11 Jun 2023 02:12:23 GMT
server
Apache
vary
Accept-Encoding
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8fde3b7e7614c23b342d70797d7c1597b6955639d3422040d800051101c842fb

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/webp
truncated
/
22 KB
22 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f7c80617b6d6d6f26a92d758c0dce67b8513c67c40cd18e3936c8b7d6c2afbbb

Request headers

Referer
Origin
https://www.dbs.comm.sg.viral221.com
accept-language
zh-SG,zh;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
font/woff
truncated
/
25 KB
25 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b60923b5232af55ca5a0e74c9488e47b421b884e1b41c79e010c104078ca8f1d

Request headers

Referer
Origin
https://www.dbs.comm.sg.viral221.com
accept-language
zh-SG,zh;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/ Frame A5D8
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
60df6e79689a538bc91389373cb9b938f63f4687bb445fe21c6255a8b98ca05c

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame A5D8
688 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6b2e265b44eecef959a7d22471d0e6e3d391185b07c95ecfdc2cb311715db15f

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/ Frame A5D8
2 MB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
aab199d7c407efc65eb067964187dc9fc6b1a723b0df18c43dc595242ea22f34

Request headers

accept-language
zh-SG,zh;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/ Frame A5D8
2 KB
2 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1f5244c71b03253ff5e2a4da21f13a016b0456825d5399ba583768bd12692c95

Request headers

Referer
Origin
null
accept-language
zh-SG,zh;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.106 Safari/537.36

Response headers

Content-Type
font/woff

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DBS Bank (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 boolean| credentialless object| onbeforetoggle object| onscrollend function| chk

0 Cookies