miasanoixu.cfolks.pl
Open in
urlscan Pro
185.208.164.24
Malicious Activity!
Public Scan
Submission: On June 12 via manual from ES — Scanned from PL
Summary
TLS certificate: Issued by Certum Domain Validation CA SHA2 on August 3rd 2022. Valid for: a year.
This is the only time miasanoixu.cfolks.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 185.208.164.24 185.208.164.24 | 41079 (CF-GDA) (CF-GDA) | |
1 | 69.16.175.10 69.16.175.10 | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 193.41.234.21 193.41.234.21 | 16289 (ING-DIREC...) (ING-DIRECT-SPAIN) | |
8 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cfolks.pl
miasanoixu.cfolks.pl |
80 KB |
1 |
ingdirect.es
ing.ingdirect.es — Cisco Umbrella Rank: 738117 |
22 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 768 |
30 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | miasanoixu.cfolks.pl |
miasanoixu.cfolks.pl
|
1 | ing.ingdirect.es |
miasanoixu.cfolks.pl
|
1 | code.jquery.com |
miasanoixu.cfolks.pl
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.cfolks.pl Certum Domain Validation CA SHA2 |
2022-08-03 - 2023-08-03 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
ing.ingdirect.es Entrust Certification Authority - L1M |
2022-06-13 - 2023-07-11 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://miasanoixu.cfolks.pl/ing/
Frame ID: 9B62580847BA3C11FC53614A26BFE05D
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
miasanoixu.cfolks.pl/ing/ |
16 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
miasanoixu.cfolks.pl/ing/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
miasanoixu.cfolks.pl/ing/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ing-lion-reversed.svg
miasanoixu.cfolks.pl/ing/ |
27 KB 12 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoING.svg
ing.ingdirect.es/app-login/assets/images/svg/ |
22 B 22 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
INGMeWeb-Regular.woff2
miasanoixu.cfolks.pl/ing/font/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
INGMeWeb-Bold.woff2
miasanoixu.cfolks.pl/ing/font/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| $ function| jQuery function| isValidDate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ing.ingdirect.es
miasanoixu.cfolks.pl
185.208.164.24
193.41.234.21
69.16.175.10
3a135f82b209a59959b162a1fbc9b0b38856d1332af286f86046b06357b3811e
67db6306e67299fb89ef09489bd0a4be9ba0aa7a027eb7a0efb28b8dd8fd44b5
6b3c4d3e255d73ca9e57959f5860c8357dbfad51249a6ee5a969c0d75f38f462
b1c6b16c89f0c078a7fd7e693f566c2aea0d72f6417ca29f76ad79d93744bb69
e008801612a41d04427fd522d313657cb123faf360e0a3821ac900c4b661f77e
e9e18797898538013a66ff759d88668598c674e0e5b6d1873c404a549640617d
f74c344733a85af20d2754b208f12309e2a30c591795d0881cb0ad94c4be6155
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d