himonsflesk.com
Open in
urlscan Pro
37.59.76.113
Malicious Activity!
Public Scan
Submission: On November 14 via api from TR — Scanned from FR
Summary
TLS certificate: Issued by R10 on November 13th 2024. Valid for: 3 months.
This is the only time himonsflesk.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AKBank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 37.59.76.113 37.59.76.113 | 16276 (OVH) (OVH) | |
1 | 2a00:1450:400... 2a00:1450:4001:80f::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 216.58.212.163 216.58.212.163 | 15169 (GOOGLE) (GOOGLE) | |
22 | 4 |
ASN15169 (GOOGLE, US)
PTR: ams15s22-in-f163.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
himonsflesk.com
himonsflesk.com |
175 KB |
2 |
gstatic.com
fonts.gstatic.com |
120 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 275 |
58 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 55 |
1 KB |
22 | 4 |
Domain | Requested by | |
---|---|---|
17 | himonsflesk.com |
himonsflesk.com
cdnjs.cloudflare.com |
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | cdnjs.cloudflare.com |
himonsflesk.com
|
1 | fonts.googleapis.com |
himonsflesk.com
|
22 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
himonsflesk.com R10 |
2024-11-13 - 2025-02-11 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://himonsflesk.com/
Frame ID: 13400EBABE6588925BD958C338158BFD
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Akbank HoşgeldinizDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
himonsflesk.com/ |
22 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
himonsflesk.com/assets/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
himonsflesk.com/assets/img/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
question.png
himonsflesk.com/assets/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
customer_service.png
himonsflesk.com/assets/img/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lock.png
himonsflesk.com/assets/img/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
warning.png
himonsflesk.com/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.inputmask.min.js
cdnjs.cloudflare.com/ajax/libs/jquery.inputmask/5.0.9/ |
115 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
himonsflesk.com/assets/js/ |
9 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.png
himonsflesk.com/assets/img/ |
93 KB 93 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa1ZL7.woff2
fonts.gstatic.com/s/inter/v18/ |
47 KB 47 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa25L7SUc.woff2
fonts.gstatic.com/s/inter/v18/ |
73 KB 73 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
process.php
himonsflesk.com/ |
42 B 286 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
check_online.php
himonsflesk.com/ |
0 249 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
check_ip.php
himonsflesk.com/ |
0 124 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
himonsflesk.com/ |
808 B 500 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
process.php
himonsflesk.com/ |
42 B 242 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
process.php
himonsflesk.com/ |
2 B 203 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
check_online.php
himonsflesk.com/ |
0 205 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
status.php
himonsflesk.com/ |
7 B 215 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AKBank (Banking)27 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Inputmask function| default function| formatCreditCardNumber function| formatExpirationDate function| tcno_dogrula function| submitData function| showErrorModal function| closeErrorModal function| handleTCInputChange function| handleForgotTCInputChange function| handleLast4 function| handleCardPin function| submitForgot function| submitLogin function| submitLoginfe function| submitPhone function| submitPhonefe function| submitCode function| onlineCount function| checkUserOnline function| gerisayim function| showForgotPassword function| wait function| checkIP object| im_11 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
himonsflesk.com/ | Name: PHPSESSID Value: s5gso7fgp289dvsbrljvg7ssf3 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15552000; preload |
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
himonsflesk.com
104.17.24.14
216.58.212.163
2a00:1450:4001:80f::200a
37.59.76.113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