xn----jtbajdhcycgys4a6a0k.xn--p1ai
Open in
urlscan Pro
Puny
кит-конференция.рф IDN
2a00:f940:2:2:1:3:0:129
Malicious Activity!
Public Scan
Submission: On November 03 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 18th 2022. Valid for: 3 months.
This is the only time xn----jtbajdhcycgys4a6a0k.xn--p1ai was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2a00:f940:2:2... 2a00:f940:2:2:1:3:0:129 | 197695 (AS-REG) (AS-REG) | |
5 | 1 |
ASN197695 (AS-REG, RU)
xn----jtbajdhcycgys4a6a0k.xn--p1ai |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
function sub() { [native code] }. |
116 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | xn----jtbajdhcycgys4a6a0k.xn--p1ai |
xn----jtbajdhcycgys4a6a0k.xn--p1ai
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
xn----jtbajdhcycgys4a6a0k.xn--p1ai R3 |
2022-09-18 - 2022-12-17 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://xn----jtbajdhcycgys4a6a0k.xn--p1ai/bitrix/wtemplates/%D1%87%D0%B5%D1%80%D0%BD%D1%8B/%D0%B2%D0%BA%D0%BB%D1%8E%D1%87%D0%B0%D0%B5%D1%82/%D1%83%D1%82%D1%80%D0%BE/%D0%97%D0%90%D0%93%D0%9E%D0%9B%D0%9E%D0%92%D0%9E%D0%9A/%D1%83%D0%B4%D0%B8%D0%B2%D0%BB%D1%8F%D1%82%D1%8C%D1%81%D1%8F/%D1%81%D0%B5%D1%80%D0%B4%D1%86%D0%B5/%D1%87%D0%B5%D1%80%D0%BD%D0%B8%D0%BB%D0%B0/AAOFN_htuA/%D1%81%D0%BB%D0%B5%D0%B4%D0%B8%D1%82%D1%8C/%D0%B7%D0%B5%D0%BC%D0%BB%D1%8F/fulls.php
Frame ID: 21670AD1726D98F2560AF3E730280403
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
fulls.php
xn----jtbajdhcycgys4a6a0k.xn--p1ai/bitrix/wtemplates/%D1%87%D0%B5%D1%80%D0%BD%D1%8B/%D0%B2%D0%BA%D0%BB%D1%8E%D1%87%D0%B0%D0%B5%D1%82/%D1%83%D1%82%D1%80%D0%BE/%D0%97%D0%90%D0%93%D0%9E%D0%9B%D0%9E%D0... |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
header.PNG
xn----jtbajdhcycgys4a6a0k.xn--p1ai/bitrix/wtemplates/%D1%87%D0%B5%D1%80%D0%BD%D1%8B/%D0%B2%D0%BA%D0%BB%D1%8E%D1%87%D0%B0%D0%B5%D1%82/%D1%83%D1%82%D1%80%D0%BE/%D0%97%D0%90%D0%93%D0%9E%D0%9B%D0%9E%D0... |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sigininss.PNG
xn----jtbajdhcycgys4a6a0k.xn--p1ai/bitrix/wtemplates/%D1%87%D0%B5%D1%80%D0%BD%D1%8B/%D0%B2%D0%BA%D0%BB%D1%8E%D1%87%D0%B0%D0%B5%D1%82/%D1%83%D1%82%D1%80%D0%BE/%D0%97%D0%90%D0%93%D0%9E%D0%9B%D0%9E%D0... |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
submit2.PNG
xn----jtbajdhcycgys4a6a0k.xn--p1ai/bitrix/wtemplates/%D1%87%D0%B5%D1%80%D0%BD%D1%8B/%D0%B2%D0%BA%D0%BB%D1%8E%D1%87%D0%B0%D0%B5%D1%82/%D1%83%D1%82%D1%80%D0%BE/%D0%97%D0%90%D0%93%D0%9E%D0%9B%D0%9E%D0... |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
end.PNG
xn----jtbajdhcycgys4a6a0k.xn--p1ai/bitrix/wtemplates/%D1%87%D0%B5%D1%80%D0%BD%D1%8B/%D0%B2%D0%BA%D0%BB%D1%8E%D1%87%D0%B0%D0%B5%D1%82/%D1%83%D1%82%D1%80%D0%BE/%D0%97%D0%90%D0%93%D0%9E%D0%9B%D0%9E%D0... |
53 KB 53 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
xn----jtbajdhcycgys4a6a0k.xn--p1ai
2a00:f940:2:2:1:3:0:129
026689cf002276e84232ef3b81b37663fe2504ea4051f6509b7b2eefbadd0006
95f268067fcd1d7d7c4512eefb95c79e097c69d21835e2e8f05acb3e8a180cab
ac5e930c36d9bd29ecf5728664b92117d713e1effa7e4eefc2dfba9b3783d392
c2e9b340b890890d30ab7b0d170f0b747827a04ced4e96e726cd5f11ec301976
d6272578e2b251ccba38765252476c6a8d023d69b8073e21c693c998389cc84b