spk-verifikation.top
Open in
urlscan Pro
2606:4700:30::681f:48ef
Malicious Activity!
Public Scan
Effective URL: https://spk-verifikation.top/spk/anmelden/2590909430/jmacNAQzDQiazpdxVDEClT9iY6mYyG3R/020889447763188045/FNqP5oVsmt8q/3164043...
Submission: On March 05 via manual from CH
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on March 4th 2019. Valid for: a year.
This is the only time spk-verifikation.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 91.216.63.240 91.216.63.240 | 50974 (EDICIONES...) (EDICIONES-EL-PAIS-AS) | |
1 1 | 185.62.188.69 185.62.188.69 | 49349 (DOTSI) (DOTSI) | |
1 1 | 2606:4700:30:... 2606:4700:30::681b:b573 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 2606:4700:30:... 2606:4700:30::681f:49ef | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 12 | 2606:4700:30:... 2606:4700:30::681f:48ef | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
11 | 1 |
ASN49349 (DOTSI, PT)
PTR: hosted-by.blazingfast.io
sopidgh0iqewrvasff.xyz |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
weiterleitung.pw |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
spk-verifikation.top |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
spk-verifikation.top |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
spk-verifikation.top
2 redirects
spk-verifikation.top |
195 KB |
1 |
weiterleitung.pw
1 redirects
weiterleitung.pw |
308 B |
1 |
sopidgh0iqewrvasff.xyz
1 redirects
sopidgh0iqewrvasff.xyz |
310 B |
1 |
cort.as
1 redirects
cort.as |
245 B |
11 | 4 |
Domain | Requested by | |
---|---|---|
13 | spk-verifikation.top |
2 redirects
spk-verifikation.top
|
1 | weiterleitung.pw | 1 redirects |
1 | sopidgh0iqewrvasff.xyz | 1 redirects |
1 | cort.as | 1 redirects |
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-03-04 - 2020-03-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://spk-verifikation.top/spk/anmelden/2590909430/jmacNAQzDQiazpdxVDEClT9iY6mYyG3R/020889447763188045/FNqP5oVsmt8q/316404348114
Frame ID: FD831EF6C619C3D20643D05817173C2C
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://cort.as/-FImr
HTTP 301
http://sopidgh0iqewrvasff.xyz/?l=ooevj HTTP 302
https://weiterleitung.pw/ HTTP 302
http://spk-verifikation.top/spk/de/verifizierung/anmelden HTTP 301
https://spk-verifikation.top/spk/de/verifizierung/anmelden HTTP 302
https://spk-verifikation.top/spk/anmelden/2590909430/jmacNAQzDQiazpdxVDEClT9iY6mYyG3R/020889447763188045/... Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://cort.as/-FImr
HTTP 301
http://sopidgh0iqewrvasff.xyz/?l=ooevj HTTP 302
https://weiterleitung.pw/ HTTP 302
http://spk-verifikation.top/spk/de/verifizierung/anmelden HTTP 301
https://spk-verifikation.top/spk/de/verifizierung/anmelden HTTP 302
https://spk-verifikation.top/spk/anmelden/2590909430/jmacNAQzDQiazpdxVDEClT9iY6mYyG3R/020889447763188045/FNqP5oVsmt8q/316404348114 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
316404348114
spk-verifikation.top/spk/anmelden/2590909430/jmacNAQzDQiazpdxVDEClT9iY6mYyG3R/020889447763188045/FNqP5oVsmt8q/ Redirect Chain
|
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xVLVXGVIyT456bmNZ2olKkClW
spk-verifikation.top/spk/ |
14 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
x2kVTGBMQ87wRqL32U0KSY
spk-verifikation.top/spk/ |
9 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xWGYqDTyApTGEQgtQPH0
spk-verifikation.top/spk/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xJpveon9ai7QeQp7Uve5R2
spk-verifikation.top/spk/ |
6 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xBLVjMV6rqnW4rSlH3y
spk-verifikation.top/spk/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xwd6hGOFAlIVhBCSns0uZ
spk-verifikation.top/spk/ |
4 KB 1 KB |
Script
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xPhL59nusUPJWUXwsaH
spk-verifikation.top/spk/ |
47 KB 47 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xvJptNiA4ZEtz5rqR31
spk-verifikation.top/spk/ |
39 KB 39 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xpxHA7d3sPFcVKPRypI
spk-verifikation.top/spk/ |
27 KB 27 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xUGh86eXDqPEqnQmGSa
spk-verifikation.top/spk/ |
39 KB 39 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| xPl998jZAAxuD8KguDX9L function| xl53PWWXWylqPG2QjZjukhn2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
spk-verifikation.top/ | Name: PHPSESSID Value: p47uamg5ft7131b8kc7mdvtle2 |
|
.spk-verifikation.top/ | Name: __cfduid Value: d4152d22d4a11ade7fee6e971afb684cf1551787896 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cort.as
sopidgh0iqewrvasff.xyz
spk-verifikation.top
weiterleitung.pw
185.62.188.69
2606:4700:30::681b:b573
2606:4700:30::681f:48ef
2606:4700:30::681f:49ef
91.216.63.240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