www.n26-login-app.girokunz.online
Open in
urlscan Pro
192.162.69.76
Malicious Activity!
Public Scan
Effective URL: https://www.n26-login-app.girokunz.online/943dd/log.php?ip=89.249.64.171&countryCode=DE&OS=Windows%2010&token=TW96aWxsYS81LjAgKFdpbmRvd3Mg...
Submission: On September 06 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by R3 on September 6th 2021. Valid for: 3 months.
This is the only time www.n26-login-app.girokunz.online was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: N26 (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 5 | 192.162.69.76 192.162.69.76 | 16347 (RMI-FITECH) (RMI-FITECH) | |
2 | 1 |
ASN16347 (RMI-FITECH, FR)
PTR: girokunz.online
www.n26-login-app.girokunz.online |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
girokunz.online
3 redirects
www.n26-login-app.girokunz.online |
41 KB |
2 | 1 |
Domain | Requested by | |
---|---|---|
5 | www.n26-login-app.girokunz.online |
3 redirects
www.n26-login-app.girokunz.online
|
2 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
n26-login-app.girokunz.online R3 |
2021-09-06 - 2021-12-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.n26-login-app.girokunz.online/943dd/log.php?ip=89.249.64.171&countryCode=DE&OS=Windows%2010&token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzkyLjAuNDUxNS4xNTkgU2FmYXJpLzUzNy4zNjg5LjI0OS42NC4xNzEyMDIxOlNlcDpNb24=
Frame ID: 6A1A38DD6BB11514441EEBCF67C62E24
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Synchronisiere deine AppPage URL History Show full URLs
-
https://www.n26-login-app.girokunz.online/
HTTP 302
https://www.n26-login-app.girokunz.online/943dd HTTP 301
https://www.n26-login-app.girokunz.online/943dd/ HTTP 302
https://www.n26-login-app.girokunz.online/943dd/log.php?ip=89.249.64.171&countryCode=DE&OS=Windows%2010&token=TW96aWxs... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Varnish (Cache Tools) Expand
Detected patterns
- headers via /varnish(?: \(Varnish\/([\d.]+)\))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.n26-login-app.girokunz.online/
HTTP 302
https://www.n26-login-app.girokunz.online/943dd HTTP 301
https://www.n26-login-app.girokunz.online/943dd/ HTTP 302
https://www.n26-login-app.girokunz.online/943dd/log.php?ip=89.249.64.171&countryCode=DE&OS=Windows%2010&token=TW96aWxsYS81LjAgKFdpbmRvd3MgTlQgMTAuMDsgV2luNjQ7IHg2NCkgQXBwbGVXZWJLaXQvNTM3LjM2IChLSFRNTCwgbGlrZSBHZWNrbykgQ2hyb21lLzkyLjAuNDUxNS4xNTkgU2FmYXJpLzUzNy4zNjg5LjI0OS42NC4xNzEyMDIxOlNlcDpNb24= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
log.php
www.n26-login-app.girokunz.online/943dd/ Redirect Chain
|
38 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
www.n26-login-app.girokunz.online/943dd/postale-M3tri_files/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: N26 (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.n26-login-app.girokunz.online
192.162.69.76
0b46b3c9ccade71fe2cdc746b8445d11c45b2eec9f93bf2ff84c5f3d7c34749b
2b381363dda049f2d49a59037b228bc865d51ffb977c8f5c3547d5c28de48e3a