basvursu.com
Open in
urlscan Pro
104.21.12.160
Malicious Activity!
Public Scan
Submission Tags: @ecarlesi threat #phishing #trcert Search All
Submission: On October 31 via api from PL — Scanned from PL
Summary
TLS certificate: Issued by GTS CA 1P5 on October 30th 2023. Valid for: 3 months.
This is the only time basvursu.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BDDK (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 104.21.12.160 104.21.12.160 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
basvursu.com
basvursu.com |
237 KB |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | basvursu.com | |
1 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
giris.turkiye.gov.tr |
yesilkart.online |
www.turkiye.gov.tr |
Subject Issuer | Validity | Valid | |
---|---|---|---|
basvursu.com GTS CA 1P5 |
2023-10-30 - 2024-01-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://basvursu.com/edevlet.php
Frame ID: 189414BEC33CF8103E27680EA0A910E2
Requests: 11 HTTP requests in this frame
4 Outgoing links
These are links going to different origins than the main page.
Title: Ä°çeriğe Git
Search URL Search Domain Scan URL
Title: e-Devlet Şifresi Nedir, Nasıl Alınır?
Search URL Search Domain Scan URL
Title: Şifremi Unuttum
Search URL Search Domain Scan URL
Title: Hızlı Çözüm Merkezi
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
edevlet.php
basvursu.com/ |
655 KB 237 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 19 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
448 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
393 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
20 KB 20 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
19 KB 19 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
38 KB 38 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BDDK (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| savepage_ShadowLoader0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
basvursu.com
104.21.12.160
0b155ade172e77bc397377c1856af15289b509590b332b351e48f5c11f73a35e
14e8e481e7afcaae3200f172bd49bf7146ea2a23d3fdf0ba71d5fdbbd0c8c5a4
27292f1f2138adbd114fa0463bec7cfcb3475c08477f79554da42d858be68d70
39966ec7eea8f508184cef9f98895a0e8d74e3328a43cc8a93c528cfca888691
473f0d637169b8b400874ffb0c487dfc5f4bc544e8bfebe98502a6a5ceb781e7
537d46273fe124bbced2f098f26222fa3155741e9d76f906c3c39e7fa09bf6a8
78e78c58a6dab82f460252e9a0dcdcb5d0c0eb2f2307998764dea1dc1796a4f0
814a3f4f20f812103033c8345c9bbd27f561a5462f34843e88c94f6f5dc4092c
945f7d25e8f885da3c77668f74ecacefa894dc535ac048f57a56e2b2fc2560df
d29bfb369f1825aee7543f2be9666a04b25952b7d22444d9f204ed42685f375a
ff7498da718b1f50faeefae71e24ceadf4575da0692b84c9a1ad359daa1f2ff2