direct-l-bb.20-110-168-123.plesk.page Open in urlscan Pro
20.110.168.123  Malicious Activity! Public Scan

URL: https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Submission Tags: 7450388
Submission: On February 22 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 5 HTTP transactions. The main IP is 20.110.168.123, located in Boydton, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is direct-l-bb.20-110-168-123.plesk.page.
TLS certificate: Issued by R3 on February 19th 2022. Valid for: 3 months.
This is the only time direct-l-bb.20-110-168-123.plesk.page was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Landesbank Berlin (Banking)

Domain & IP information

IP Address AS Autonomous System
3 20.110.168.123 8075 (MICROSOFT...)
1 2a00:1450:400... 15169 (GOOGLE)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
5 3
Apex Domain
Subdomains
Transfer
3 plesk.page
direct-l-bb.20-110-168-123.plesk.page
309 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 546
79 KB
1 googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 250
33 KB
5 3
Domain Requested by
3 direct-l-bb.20-110-168-123.plesk.page direct-l-bb.20-110-168-123.plesk.page
1 code.jquery.com direct-l-bb.20-110-168-123.plesk.page
1 ajax.googleapis.com direct-l-bb.20-110-168-123.plesk.page
5 3

This site contains no links.

Subject Issuer Validity Valid
direct-l-bb.20-110-168-123.plesk.page
R3
2022-02-19 -
2022-05-20
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2022-02-07 -
2022-05-02
3 months crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Frame ID: 00F51E47BA712A88F9EF18F6115E39E2
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Clientes

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • /([\d.]+)/jquery(?:\.min)?\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

5
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

422 kB
Transfer

669 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request index.php
direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/
13 KB
13 KB
Document
General
Full URL
https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
20.110.168.123 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
44a8fef8521fea49f06cb65d78b68d84c6da177159d5a7638035cbd3c9c663af

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

content-type
text/html; charset=UTF-8
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
x-powered-by-plesk
PleskWin
date
Tue, 22 Feb 2022 12:31:02 GMT
content-length
12892
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.11.1/
94 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.11.1/jquery.min.js
Requested by
Host: direct-l-bb.20-110-168-123.plesk.page
URL: https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:82b::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
540bc6dec1dd4b92ea4d3fb903f69eabf6d919afd48f4e312b163c28cff0f441
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://direct-l-bb.20-110-168-123.plesk.page/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 16 Feb 2022 13:48:35 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
513747
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/hosted-libraries-pushers
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33434
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 19:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="hosted-libraries-pushers"
vary
Accept-Encoding
report-to
{"group":"hosted-libraries-pushers","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/hosted-libraries-pushers"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 16 Feb 2023 13:48:35 GMT
jquery-1.10.2.js
code.jquery.com/
267 KB
79 KB
Script
General
Full URL
https://code.jquery.com/jquery-1.10.2.js
Requested by
Host: direct-l-bb.20-110-168-123.plesk.page
URL: https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:2a , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
8ade6740a1d3cfedf81e28d9250929341207b23a55f1be90ccc26cf6d98e052a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://direct-l-bb.20-110-168-123.plesk.page/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Tue, 22 Feb 2022 12:31:02 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-42b2f"
vary
Accept-Encoding
x-hw
1645533062.dop151.am5.t,1645533062.cds227.am5.hn,1645533062.cds210.am5.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
80743
see.png
direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/img/
1 KB
1 KB
Image
General
Full URL
https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/img/see.png
Requested by
Host: direct-l-bb.20-110-168-123.plesk.page
URL: https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
20.110.168.123 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
f0ebb76b3196262b9b7b581b20a4acb43c393d800a5249f66215562757fdde34

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-powered-by-plesk
PleskWin
date
Tue, 22 Feb 2022 12:31:02 GMT
last-modified
Wed, 09 Feb 2022 06:16:37 GMT
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
etag
"8010f5977c1dd81:0"
content-type
image/png
accept-ranges
bytes
content-length
1084
cad.png
direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/img/
295 KB
295 KB
Image
General
Full URL
https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/img/cad.png
Requested by
Host: direct-l-bb.20-110-168-123.plesk.page
URL: https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
20.110.168.123 Boydton, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
a39cfd65b44e63a4ba9ef650493a315ccf9dd415868f4ab218bc58062fe3b4ef

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://direct-l-bb.20-110-168-123.plesk.page/direct/online/access/T83256674/index.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-powered-by-plesk
PleskWin
date
Tue, 22 Feb 2022 12:31:02 GMT
last-modified
Wed, 09 Feb 2022 09:02:39 GMT
server
Microsoft-IIS/10.0
x-powered-by
ASP.NET
etag
"80a1c5c9931dd81:0"
content-type
image/png
accept-ranges
bytes
content-length
301988

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Landesbank Berlin (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone function| $ function| jQuery

0 Cookies