p6taa7fq.dreamwp.com
Open in
urlscan Pro
176.74.24.122
Malicious Activity!
Public Scan
Effective URL: https://p6taa7fq.dreamwp.com/no/24/
Submission Tags: @phish_report
Submission: On January 06 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 4th 2023. Valid for: a year.
This is the only time p6taa7fq.dreamwp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BankID (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 34.102.239.211 34.102.239.211 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
1 1 | 104.21.234.215 104.21.234.215 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 176.74.24.122 176.74.24.122 | 38719 (DREAMSCAP...) (DREAMSCAPE-AS-AP Dreamscape Networks Limited) | |
6 | 2 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 211.239.102.34.bc.googleusercontent.com
email.y.kajabimail.net |
ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU)
PTR: ipb04a187a.ipv4.lon01.ds.network
p6taa7fq.dreamwp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
dreamwp.com
p6taa7fq.dreamwp.com |
30 KB |
1 |
urlz.fr
1 redirects
urlz.fr — Cisco Umbrella Rank: 901799 |
474 B |
1 |
kajabimail.net
1 redirects
email.y.kajabimail.net |
152 B |
6 | 3 |
Domain | Requested by | |
---|---|---|
6 | p6taa7fq.dreamwp.com |
p6taa7fq.dreamwp.com
|
1 | urlz.fr | 1 redirects |
1 | email.y.kajabimail.net | 1 redirects |
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.dreamwp.com Sectigo RSA Domain Validation Secure Server CA |
2023-01-04 - 2024-01-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://p6taa7fq.dreamwp.com/no/24/
Frame ID: B8D1DC84B34EE23A88A7308D4D541F74
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
BankIDPage URL History Show full URLs
-
https://email.y.kajabimail.net/c/eJxskM2uFCEQhZ-m2Zg7Kf6HBQuNTuLaB-hUQ42DdgMCbTL36c2daXWhO_Id6kvOwVrnjBv57_...
HTTP 302
https://urlz.fr/p9o7 HTTP 302
https://p6taa7fq.dreamwp.com/no/24/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://email.y.kajabimail.net/c/eJxskM2uFCEQhZ-m2Zg7Kf6HBQuNTuLaB-hUQ42DdgMCbTL36c2daXWhO_Id6kvOwVrnjBv57_gNl_TSR2l0bSWP_lJbiXsYqWQWvRFBGkaeW1DKGOccow3TOkda009q9zlFz89nY0Bzy-FIU_SCa8GdBWsPtlHv-JXmca_kn2hpBWPAPo4vjXrZW6D_3nf6sVN-hgd6qD69PT_8Md285RSXK0rU1vEAAcXVGURhQDtFYWHJCxAKOGiuQXJ3chaXgOocwVgA4JOC--k5zZv8lGmw1d_GqH2S7ydxmcRlb-vr6domcamuWPa7Xaccqc2xbJiy_8fSfK_rnl6NMZOCWxmPJJSNNQqpJsrjUV5JZbUxQrOexrGHsk5qKR0b_ksa9O7zx0nIv_hXAAAA__-QhpjA
HTTP 302
https://urlz.fr/p9o7 HTTP 302
https://p6taa7fq.dreamwp.com/no/24/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
p6taa7fq.dreamwp.com/no/24/ Redirect Chain
|
21 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common_auth.css
p6taa7fq.dreamwp.com/no/24/index_fichiers/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bidm.css
p6taa7fq.dreamwp.com/no/24/index_fichiers/ |
42 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3625.css
p6taa7fq.dreamwp.com/no/24/index_fichiers/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo2.svg
p6taa7fq.dreamwp.com/no/24/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo1.png
p6taa7fq.dreamwp.com/no/24/index_fichiers/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
240 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
172 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BankID (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
email.y.kajabimail.net
p6taa7fq.dreamwp.com
urlz.fr
104.21.234.215
176.74.24.122
34.102.239.211
254868d92f9456d518064051d29f9ff0532bf9a5da291b06f8accb0900e40072
304c378b4700d25f783a2a7d6142c0b4d9dd9df890722064788eee96a12999d8
31412635ed02fd2c9a9ac4c4d9093c0601a687cfe305aba0dea75c1943d7dd72
3d74e2403dabcb5f98cbbeb9c8a808a15488b46eb2d7698396924015f66e4e6f
4dca530d4682ddf6f4b9053173c007f95875c2634a6b61c9573d93fc21483766
5d4ff4117e8f7f9da541cba635327a05770499b79e51e32e679c2923a4bc27b2
7fbcb3628e9d79d89e9350ee5d075818cf0f6763d5fa8763ea78c13902d6691b
ed26bb550b9c5d5a9550a73fab2e5fc6820659a3119c6cba0a81eb7720392d64
f4eb244555324863a9067686a9e08c9bd7db827ed8dd9a0de8a3cdbc32b66437