mijn.belastngdienst.pitaescuela.org
Open in
urlscan Pro
77.221.153.43
Malicious Activity!
Public Scan
Effective URL: https://mijn.belastngdienst.pitaescuela.org/informatie/
Submission: On October 17 via manual from NL — Scanned from DE
Summary
TLS certificate: Issued by R11 on October 17th 2024. Valid for: 3 months.
This is the only time mijn.belastngdienst.pitaescuela.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 212.47.65.146 212.47.65.146 | 51167 (CONTABO) (CONTABO) | |
1 6 | 77.221.153.43 77.221.153.43 | 210644 (AEZA-AS) (AEZA-AS) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 3 |
ASN51167 (CONTABO, DE)
PTR: vmi2192472.contaboserver.net
eg.fflr1.shop |
ASN210644 (AEZA-AS, GB)
PTR: frightened-kick.aeza.network
mijn.belastngdienst.pitaescuela.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
pitaescuela.org
1 redirects
mijn.belastngdienst.pitaescuela.org |
57 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
138 KB |
2 |
fflr1.shop
1 redirects
eg.fflr1.shop |
573 B |
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | mijn.belastngdienst.pitaescuela.org |
1 redirects
eg.fflr1.shop
mijn.belastngdienst.pitaescuela.org |
2 | cdnjs.cloudflare.com |
mijn.belastngdienst.pitaescuela.org
cdnjs.cloudflare.com |
2 | eg.fflr1.shop | 1 redirects |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
eg.fflr1.shop R10 |
2024-10-08 - 2025-01-06 |
3 months | crt.sh |
mijn.belastngdienst.pitaescuela.org R11 |
2024-10-17 - 2025-01-15 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mijn.belastngdienst.pitaescuela.org/informatie/
Frame ID: 572A6C93EDFDB4D90EE344EBEDA96938
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Mijn belastingdienst - InloggenPage URL History Show full URLs
-
https://eg.fflr1.shop/btw
HTTP 301
https://eg.fflr1.shop/btw/ Page URL
-
https://mijn.belastngdienst.pitaescuela.org/informatie
HTTP 301
https://mijn.belastngdienst.pitaescuela.org/informatie/ Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://eg.fflr1.shop/btw
HTTP 301
https://eg.fflr1.shop/btw/ Page URL
-
https://mijn.belastngdienst.pitaescuela.org/informatie
HTTP 301
https://mijn.belastngdienst.pitaescuela.org/informatie/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://eg.fflr1.shop/btw HTTP 301
- https://eg.fflr1.shop/btw/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
eg.fflr1.shop/btw/ Redirect Chain
|
120 B 326 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
mijn.belastngdienst.pitaescuela.org/informatie/ Redirect Chain
|
2 KB 1010 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_styles.css
mijn.belastngdienst.pitaescuela.org/informatie/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/css/ |
82 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
belastingdienst-logo.jpg
mijn.belastngdienst.pitaescuela.org/informatie/ |
32 KB 33 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
digid_logo.jpg
mijn.belastngdienst.pitaescuela.org/informatie/ |
21 KB 21 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.0.0-beta3/webfonts/ |
122 KB 123 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
mijn.belastngdienst.pitaescuela.org/ |
1 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
October 17th 2024, 11:39:08 am
UTC —
From Netherlands
Threats:
Brand Impersonation
Phishing
Brands:
NL Government
NL
Comment: Stealing PII from dutch tax payers in the netherlands
Malicious
page.url
Submitted on
October 17th 2024, 10:38:59 am
UTC —
From Netherlands
Threats:
Brand Impersonation
Phishing
Brands:
NL Government
NL
Comment: Not Dutch Tax and Customs; this be phish.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
eg.fflr1.shop
mijn.belastngdienst.pitaescuela.org
104.17.24.14
212.47.65.146
77.221.153.43
217e1058f86aa5a9a0a10f9db9af864d7b57b439552dbcdea00aa2fc8f155e41
94e1bbc1c2a41ebc73fa5253fd563256c0035b4d69181e48f9aef9e474a11251
970570a081052fa859515d769eb4ba49d1178cdb4b781cf60ea362fb21242545
a18289801ccf7da4a2536cda3ad79aec17364b370789b71244ea406fdb5af925
a361e7885c36bacb3fd9cb068da207c3b9329962cac022d06e28923939f575e8
b533020cc92eb8b744cdd09332f383b94d332cd9d102437bead04743affc04fc
c18507d235614b3d02079428f5bde3774caabee21b2ad7428231724caeb770bc