meinceuntaoff.cfolks.pl
Open in
urlscan Pro
185.204.218.115
Malicious Activity!
Public Scan
Effective URL: https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/particulares
Submission: On August 22 via manual from ES — Scanned from NL
Summary
TLS certificate: Issued by Certum Domain Validation CA SHA2 on August 3rd 2022. Valid for: a year.
This is the only time meinceuntaoff.cfolks.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 16 | 185.204.218.115 185.204.218.115 | 41079 (CF-GDA) (CF-GDA) | |
14 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
cfolks.pl
2 redirects
meinceuntaoff.cfolks.pl |
755 KB |
2 |
xurls.org
2 redirects
xurls.org |
2 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
16 | meinceuntaoff.cfolks.pl |
2 redirects
meinceuntaoff.cfolks.pl
|
2 | xurls.org | 2 redirects |
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.cfolks.pl Certum Domain Validation CA SHA2 |
2022-08-03 - 2023-08-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/particulares
Frame ID: 5938C7A729C3F7AEB3166ED5BA806A3A
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
Home BankingPage URL History Show full URLs
-
http://xurls.org/xAwOSOjM
HTTP 301
https://xurls.org/xAwOSOjM HTTP 302
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home HTTP 301
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/ HTTP 302
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/particulares Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://xurls.org/xAwOSOjM
HTTP 301
https://xurls.org/xAwOSOjM HTTP 302
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home HTTP 301
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/ HTTP 302
https://meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/particulares Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
particulares
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/ Redirect Chain
|
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.a5beaad1.css
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
314 KB 39 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
angular.min.js
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style/js/ |
163 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style/js/ |
286 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.validate.min.js
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style/js/ |
49 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.mask.js
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style/js/ |
18 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
smarbannerimg.png
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/images/ |
708 B 708 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
spring_afternoon_p.jpg
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style/ |
371 KB 372 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ico3.ttf
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
41 KB 25 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ico.ttf
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
27 KB 16 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Lato-Regular.woff
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
37 KB 37 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Lato-Light.woff
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
35 KB 35 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Lato-Semibold.woff
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
38 KB 38 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Lato-Bold.woff
meinceuntaoff.cfolks.pl/ceunta/x/Iogin/home/style// |
36 KB 36 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| angular function| $ function| jQuery3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
xurls.org/ | Name: PHPSESSID Value: 590ee5bq2u51cro6s6tlfv4d2j |
|
xurls.org/ | Name: short_8394 Value: 1 |
|
meinceuntaoff.cfolks.pl/ | Name: PHPSESSID Value: de3f0265715175124a757827a1cc609a |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
meinceuntaoff.cfolks.pl
xurls.org
185.204.218.115
2a06:98c1:3121::3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