ebank-dankse.com
Open in
urlscan Pro
193.143.1.14
Malicious Activity!
Public Scan
Effective URL: https://ebank-dankse.com/Digital_servletcontroller.php?sslchannel=true&sessionid=o2RMBdSaKXOCPQzNEqQZSFivl8sm5ksfVSKFSFgu...
Submission: On June 22 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R10 on June 22nd 2024. Valid for: 3 months.
This is the only time ebank-dankse.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Danske Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 193.143.1.14 193.143.1.14 | 198953 (PROTON66) (PROTON66) | |
1 | 2a04:4e42:400... 2a04:4e42:400::485 | 54113 (FASTLY) (FASTLY) | |
1 | 212.93.61.101 212.93.61.101 | 12483 (DANSKEBAN...) (DANSKEBANK-AS Aarhus Denmark) | |
8 | 4 |
ASN12483 (DANSKEBANK-AS Aarhus Denmark, DK)
app.danskebank.co.uk |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
ebank-dankse.com
1 redirects
ebank-dankse.com |
149 KB |
1 |
danskebank.co.uk
app.danskebank.co.uk |
6 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 381 |
25 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
7 | ebank-dankse.com |
1 redirects
ebank-dankse.com
|
1 | app.danskebank.co.uk |
ebank-dankse.com
|
1 | cdn.jsdelivr.net |
ebank-dankse.com
|
8 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
danskebank.co.uk |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ebank-dankse.com R10 |
2024-06-22 - 2024-09-20 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
www.danskebank.co.uk GlobalSign RSA OV SSL CA 2018 |
2024-01-30 - 2025-03-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ebank-dankse.com/Digital_servletcontroller.php?sslchannel=true&sessionid=o2RMBdSaKXOCPQzNEqQZSFivl8sm5ksfVSKFSFguGr0YmPUBHzsaZ3WWnjBczmV6enZELM9XclwdGK3WJtZT6aEtIEOpVjUZ6iLPYIpQ1F7CpBEzWDbLSDjc3nu1aQ0QLM
Frame ID: AA293B1B63D36E7BD7E4914572B04500
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Log on to eBankingPage URL History Show full URLs
-
https://ebank-dankse.com/
HTTP 302
https://ebank-dankse.com/Digital_servletcontroller.php?sslchannel=true&sessionid=o2RMBdSaKXOCPQzNEqQZ... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: Register for eBanking
Search URL Search Domain Scan URL
Title: FAQ
Search URL Search Domain Scan URL
Title: Technical requirements
Search URL Search Domain Scan URL
Title: Legal information
Search URL Search Domain Scan URL
Title: Help to logon
Search URL Search Domain Scan URL
Title: Contact Customer Support
Search URL Search Domain Scan URL
Title: Read more about security
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ebank-dankse.com/
HTTP 302
https://ebank-dankse.com/Digital_servletcontroller.php?sslchannel=true&sessionid=o2RMBdSaKXOCPQzNEqQZSFivl8sm5ksfVSKFSFguGr0YmPUBHzsaZ3WWnjBczmV6enZELM9XclwdGK3WJtZT6aEtIEOpVjUZ6iLPYIpQ1F7CpBEzWDbLSDjc3nu1aQ0QLM Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Digital_servletcontroller.php
ebank-dankse.com/ Redirect Chain
|
37 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.0.2/dist/css/ |
152 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.svg
ebank-dankse.com/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
palm.png
ebank-dankse.com/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Take_Five_logo_roundel_75x75px.png
app.danskebank.co.uk/en-gb/eBanking-content/text-pages/boxes/PublishingImages/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
dk_text-webfont.50529db33ac4e983017c.woff2
ebank-dankse.com/fonts/ |
35 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
DanskeHuman-MediumItalic.05085c8434ef42dd71dc.woff
ebank-dankse.com/fonts/ |
83 KB 84 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
ebank-dankse.com/ |
1 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Danske Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ebank-dankse.com/ | Name: PHPSESSID Value: 8b3a9a5f90f64b04d7c6493edb202b4f |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
app.danskebank.co.uk
cdn.jsdelivr.net
ebank-dankse.com
193.143.1.14
212.93.61.101
2a04:4e42:400::485
14c5ab5a06f250378f29f31ab8cf707017e9e84c3416443696f708c75bc52eeb
2566dcb0230f1ae2412d24ade3f940e3e6a6b3b6ee40501711bf53abc19386a7
4c13d452dd5d49671bd93ca32f2b4f85c78e39b6ab0ad1f38d98ed267f8fd896
7633b7c0c97d19e682feee8afa2738523fcb2a14544a550572caeecd2eefe66b
cbebedd550f1d8ea6c9095f303d486b3afb97b0155a112e7104a514bfaa81a28
cfe07425c996cf31442d7c92130f0d095225807e476c3f87d7f2996f0abea120
edec1cc84eedcf34451ec2e6651b1287b5563152fcbb56d02e5a54a48bff1498
f92371fb62b7f9a0a3d84d27fe4b1096b5228b19373e223e65ba315652047f27