kloksas021.ddns.net Open in urlscan Pro
13.85.79.217  Malicious Activity! Public Scan

Submitted URL: http://ht.ly/Mjnm30rIMrC
Effective URL: https://kloksas021.ddns.net/bbt2021/
Submission: On June 02 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 5 domains to perform 4 HTTP transactions. The main IP is 13.85.79.217, located in San Antonio, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is kloksas021.ddns.net.
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 1st 2021. Valid for: 3 months.
This is the only time kloksas021.ddns.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: BB&T Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 54.67.57.56 16509 (AMAZON-02)
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
1 1 52.222.149.48 16509 (AMAZON-02)
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
1 5 13.85.79.217 8075 (MICROSOFT...)
4 1
Apex Domain
Subdomains
Transfer
5 ddns.net
kloksas021.ddns.net
54 KB
1 llk.dk
llk.dk
616 B
1 onelink.me
abokalbabeeh.onelink.me
293 B
1 cya.nz
cya.nz
711 B
1 ht.ly
ht.ly
390 B
4 5
Domain Requested by
5 kloksas021.ddns.net 1 redirects kloksas021.ddns.net
1 llk.dk 1 redirects
1 abokalbabeeh.onelink.me 1 redirects
1 cya.nz 1 redirects
1 ht.ly 1 redirects
4 5

This site contains no links.

Subject Issuer Validity Valid
kloksas021.ddns.net
cPanel, Inc. Certification Authority
2021-06-01 -
2021-08-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://kloksas021.ddns.net/bbt2021/
Frame ID: E460B82E044D9C5715B09597A85B7D65
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://ht.ly/Mjnm30rIMrC HTTP 301
    https://cya.nz/4K9v?platform=hootsuite HTTP 301
    https://abokalbabeeh.onelink.me/tMK6/ HTTP 302
    https://llk.dk/icvdao HTTP 302
    https://kloksas021.ddns.net/bbt2021 HTTP 301
    https://kloksas021.ddns.net/bbt2021/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

100 %
HTTPS

40 %
IPv6

5
Domains

5
Subdomains

1
IPs

1
Countries

54 kB
Transfer

128 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ht.ly/Mjnm30rIMrC HTTP 301
    https://cya.nz/4K9v?platform=hootsuite HTTP 301
    https://abokalbabeeh.onelink.me/tMK6/ HTTP 302
    https://llk.dk/icvdao HTTP 302
    https://kloksas021.ddns.net/bbt2021 HTTP 301
    https://kloksas021.ddns.net/bbt2021/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
kloksas021.ddns.net/bbt2021/
Redirect Chain
  • http://ht.ly/Mjnm30rIMrC
  • https://cya.nz/4K9v?platform=hootsuite
  • https://abokalbabeeh.onelink.me/tMK6/
  • https://llk.dk/icvdao
  • https://kloksas021.ddns.net/bbt2021
  • https://kloksas021.ddns.net/bbt2021/
466 B
786 B
Document
General
Full URL
https://kloksas021.ddns.net/bbt2021/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.85.79.217 San Antonio, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
c33f1d79ff8a5225bb8136d5dc85c3bd138566184a0345b41301f06ff2bbca66

Request headers

Host
kloksas021.ddns.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 02 Jun 2021 01:14:21 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
cazanova=13b8b7c3cfa7f6490867696dd4e124669cc75d9e; expires=Wed, 02-Jun-2021 03:14:21 GMT; Max-Age=7200; path=/; HttpOnly
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
307
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Wed, 02 Jun 2021 01:14:21 GMT
Server
Apache
Location
https://kloksas021.ddns.net/bbt2021/
Content-Length
244
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
captcha.js
kloksas021.ddns.net/bbt2021/assets/js/
118 KB
42 KB
Script
General
Full URL
https://kloksas021.ddns.net/bbt2021/assets/js/captcha.js
Requested by
Host: kloksas021.ddns.net
URL: https://kloksas021.ddns.net/bbt2021/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.85.79.217 San Antonio, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
6f7d1dc4867c2df3a57e5ab46e45d755e11eee0abbefa53a22e56219fcd89c61

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
kloksas021.ddns.net
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://kloksas021.ddns.net/bbt2021/
Cookie
cazanova=13b8b7c3cfa7f6490867696dd4e124669cc75d9e
Connection
keep-alive
Referer
https://kloksas021.ddns.net/bbt2021/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 02 Jun 2021 01:14:21 GMT
Content-Encoding
gzip
Last-Modified
Tue, 15 Sep 2020 21:59:38 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
43144
Cookie set captcha.png
kloksas021.ddns.net/bbt2021/
4 KB
4 KB
Image
General
Full URL
https://kloksas021.ddns.net/bbt2021/captcha.png?_1622596464027
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.85.79.217 San Antonio, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
650b2e360b2bb1f5318aa0e8a4071102a2df8c04d0e7f9a6e71dcde381bff2fd

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
kloksas021.ddns.net
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://kloksas021.ddns.net/bbt2021/
Connection
keep-alive
Referer
https://kloksas021.ddns.net/bbt2021/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 02 Jun 2021 01:14:24 GMT
Content-Encoding
gzip
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Set-Cookie
cazanova=5927c07a6e7adc22808d645f44f5d041537bc49b; expires=Wed, 02-Jun-2021 03:14:24 GMT; Max-Age=7200; path=/; HttpOnly
Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Keep-Alive
timeout=5, max=97
Content-Length
3601
Expires
Thu, 19 Nov 1981 08:52:00 GMT
2134651.png
kloksas021.ddns.net/bbt2021/
6 KB
6 KB
Image
General
Full URL
https://kloksas021.ddns.net/bbt2021/2134651.png
Requested by
Host: kloksas021.ddns.net
URL: https://kloksas021.ddns.net/bbt2021/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
13.85.79.217 San Antonio, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
d80353db58e2c6be8a2a5649191a2cc72aaa54e3dcea63e243f2fc76d2284b05

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
kloksas021.ddns.net
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://kloksas021.ddns.net/bbt2021/
Connection
keep-alive
Referer
https://kloksas021.ddns.net/bbt2021/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Wed, 02 Jun 2021 01:14:24 GMT
Content-Encoding
gzip
Last-Modified
Mon, 04 Jan 2021 08:36:38 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
6222

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: BB&T Bank (Banking)

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| setImmediate function| clearImmediate function| Vue

0 Cookies