Submitted URL: http://ahmjinn.tk/imgs/login/US%20Bank/
Effective URL: http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I...
Submission: On November 02 via api from CA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 181.215.195.79, located in Amsterdam, Netherlands and belongs to SPRINT-SDC, PL. The main domain is ahmjinn.tk.
This is the only time ahmjinn.tk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: US Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
3 7 181.215.195.79 197226 (SPRINT-SDC)
4 1
Apex Domain
Subdomains
Transfer
7 ahmjinn.tk
ahmjinn.tk
59 KB
4 1
Domain Requested by
7 ahmjinn.tk 3 redirects ahmjinn.tk
4 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Frame ID: E1DAFD801827AE07D8474696E17E8860
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://ahmjinn.tk/imgs/login/US%20Bank/ HTTP 302
    http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY... HTTP 301
    http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY... HTTP 302
    http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

58 kB
Transfer

57 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ahmjinn.tk/imgs/login/US%20Bank/ HTTP 302
    http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I= HTTP 301
    http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/ HTTP 302
    http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/
Redirect Chain
  • http://ahmjinn.tk/imgs/login/US%20Bank/
  • http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=
  • http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/
  • http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
802 B
1010 B
Document
General
Full URL
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Protocol
HTTP/1.1
Server
181.215.195.79 Amsterdam, Netherlands, ASN197226 (SPRINT-SDC, PL),
Reverse DNS
edc167.naismandad.com
Software
Apache /
Resource Hash
02f440149089609df683c2a735da235fe95316980ccfa145a9d5f44a0e05128e

Request headers

Host
ahmjinn.tk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 02 Nov 2018 05:02:02 GMT
Server
Apache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Fri, 02 Nov 2018 05:02:02 GMT
Server
Apache
Location
login.php
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
1.png
ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/img/
56 KB
56 KB
Image
General
Full URL
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/img/1.png
Requested by
Host: ahmjinn.tk
URL: http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Protocol
HTTP/1.1
Server
181.215.195.79 Amsterdam, Netherlands, ASN197226 (SPRINT-SDC, PL),
Reverse DNS
edc167.naismandad.com
Software
Apache /
Resource Hash
5aa417962afd642ad2fe47f59fb974c6f02654a2f630025cd33b9f7ca027eed1

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
ahmjinn.tk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Connection
keep-alive
Cache-Control
no-cache
Referer
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 02 Nov 2018 05:02:02 GMT
Last-Modified
Fri, 02 Nov 2018 05:02:02 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
57022
login.png
ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/
422 B
422 B
Image
General
Full URL
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.png
Requested by
Host: ahmjinn.tk
URL: http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Protocol
HTTP/1.1
Server
181.215.195.79 Amsterdam, Netherlands, ASN197226 (SPRINT-SDC, PL),
Reverse DNS
edc167.naismandad.com
Software
Apache /
Resource Hash
4df8531621bdf320637bae0db4746805fa520f4108c03b543d61b8a9d659f8d5

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
ahmjinn.tk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Connection
keep-alive
Cache-Control
no-cache
Referer
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 02 Nov 2018 05:02:02 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=97
Content-Length
422
Content-Type
text/html; charset=iso-8859-1
login.png
ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/
422 B
422 B
Image
General
Full URL
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.png
Requested by
Host: ahmjinn.tk
URL: http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Protocol
HTTP/1.1
Server
181.215.195.79 Amsterdam, Netherlands, ASN197226 (SPRINT-SDC, PL),
Reverse DNS
edc167.naismandad.com
Software
Apache /
Resource Hash
4df8531621bdf320637bae0db4746805fa520f4108c03b543d61b8a9d659f8d5

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
ahmjinn.tk
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
Connection
keep-alive
Cache-Control
no-cache
Referer
http://ahmjinn.tk/imgs/login/US%20Bank/b5cbc149bd07e1d5d924924dab91112aMTg3MWQ1ZDg5MmI2MzNmMzY1Nzc4NWYzZjhiZWI2M2I=/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 02 Nov 2018 05:02:02 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=96
Content-Length
422
Content-Type
text/html; charset=iso-8859-1

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: US Bank (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ahmjinn.tk
181.215.195.79
02f440149089609df683c2a735da235fe95316980ccfa145a9d5f44a0e05128e
4df8531621bdf320637bae0db4746805fa520f4108c03b543d61b8a9d659f8d5
5aa417962afd642ad2fe47f59fb974c6f02654a2f630025cd33b9f7ca027eed1