bufirsatofirsat.click
Open in
urlscan Pro
2606:4700:3032::ac43:a0ce
Malicious Activity!
Public Scan
Submission: On August 29 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 27th 2024. Valid for: 3 months.
This is the only time bufirsatofirsat.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: AKBank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2606:4700:303... 2606:4700:3032::ac43:a0ce | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:813::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a04:4e42:600... 2a04:4e42:600::649 | 54113 (FASTLY) (FASTLY) | |
2 | 2a00:1450:400... 2a00:1450:4001:829::2003 | 15169 (GOOGLE) (GOOGLE) | |
16 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
bufirsatofirsat.click
bufirsatofirsat.click |
47 KB |
2 |
gstatic.com
fonts.gstatic.com |
121 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 1211 |
31 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
1 KB |
16 | 4 |
Domain | Requested by | |
---|---|---|
12 | bufirsatofirsat.click |
bufirsatofirsat.click
code.jquery.com |
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | code.jquery.com |
bufirsatofirsat.click
|
1 | fonts.googleapis.com |
bufirsatofirsat.click
|
16 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bufirsatofirsat.click WE1 |
2024-08-27 - 2024-11-25 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-08-05 - 2024-10-28 |
3 months | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
*.gstatic.com WR2 |
2024-08-05 - 2024-10-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bufirsatofirsat.click/
Frame ID: 2B4909347CBAFDF0C12C5E66975CF02E
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Akbank HoşgeldinizDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
bufirsatofirsat.click/ |
20 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style.css
bufirsatofirsat.click/assets/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.png
bufirsatofirsat.click/assets/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
question.png
bufirsatofirsat.click/assets/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
lock.png
bufirsatofirsat.click/assets/img/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.4.min.js
code.jquery.com/ |
88 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.js
bufirsatofirsat.click/assets/js/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bg.png
bufirsatofirsat.click/assets/img/ |
808 B 808 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa1ZL7.woff2
fonts.gstatic.com/s/inter/v18/ |
47 KB 48 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
UcC73FwrK3iLTeHuS_nVMrMxCp50SjIa25L7SUc.woff2
fonts.gstatic.com/s/inter/v18/ |
73 KB 73 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
process.php
bufirsatofirsat.click/ |
16 B 468 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
check_ip.php
bufirsatofirsat.click/ |
16 B 462 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
bufirsatofirsat.click/ |
808 B 871 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
process.php
bufirsatofirsat.click/ |
16 B 464 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
process.php
bufirsatofirsat.click/ |
16 B 464 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: AKBank (Banking)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| sendRequest function| $ function| jQuery function| submitData function| submitLogin function| submitLoginfe function| submitPhone function| submitPhonefe function| submitCode function| checkUserOnline function| gerisayim function| wait function| checkIP function| formatCreditCardNumber function| formatExpirationDate function| tcno_dogrula function| handleTCInputChange0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bufirsatofirsat.click
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
2606:4700:3032::ac43:a0ce
2a00:1450:4001:813::200a
2a00:1450:4001:829::2003
2a04:4e42:600::649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