verfahren-pushtan.com
Open in
urlscan Pro
2606:4700:3031::6815:2176
Malicious Activity!
Public Scan
Effective URL: https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/start/?index=85379&feeder=e3757aaf3a970bd7...
Submission: On February 13 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by E1 on February 13th 2024. Valid for: 3 months.
This is the only time verfahren-pushtan.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 26 | 2606:4700:303... 2606:4700:3031::6815:2176 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
24 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
verfahren-pushtan.com
4 redirects
verfahren-pushtan.com |
448 KB |
24 | 1 |
Domain | Requested by | |
---|---|---|
26 | verfahren-pushtan.com |
4 redirects
verfahren-pushtan.com
|
24 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
verfahren-pushtan.com E1 |
2024-02-13 - 2024-05-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/start/?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b
Frame ID: 4EF7EA5B1C6964E7BFCEDC122ADFBAEE
Requests: 24 HTTP requests in this frame
Screenshot
Page Title
Login Online-BankingPage URL History Show full URLs
-
https://verfahren-pushtan.com/de/startseite/
HTTP 302
https://verfahren-pushtan.com/de/startseite/white.php?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c... Page URL
-
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6?index=85379&feeder=e37...
HTTP 301
http://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/?index=85379&feeder=e3... HTTP 301
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/?index=85379&feeder=e3... HTTP 302
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/start/?index=85379&fee... Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://verfahren-pushtan.com/de/startseite/
HTTP 302
https://verfahren-pushtan.com/de/startseite/white.php?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b Page URL
-
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b
HTTP 301
http://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b HTTP 301
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b HTTP 302
https://verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/start/?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://verfahren-pushtan.com/de/startseite/ HTTP 302
- https://verfahren-pushtan.com/de/startseite/white.php?index=85379&feeder=e3757aaf3a970bd70b5d1f12f47af398c015343b
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
white.php
verfahren-pushtan.com/de/startseite/ Redirect Chain
|
787 B 812 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
verfahren-pushtan.com/de/startseite/a1b2c3/6fd9b0568e53e883597404f57cc1d2e6/start/ Redirect Chain
|
40 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
verfahren-pushtan.com/de/startseite/bower_components/jquery/dist/ |
85 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ua-parser.min.js
verfahren-pushtan.com/de/startseite/bower_components/ua-parser-js/dist/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
verfahren-pushtan.com/de/startseite/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
core_form.js
verfahren-pushtan.com/de/startseite/core/form/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
core_token.js
verfahren-pushtan.com/de/startseite/core/token/ |
25 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
angular.min.js
verfahren-pushtan.com/de/startseite/bower_components/angular/ |
165 KB 59 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
core_form.css
verfahren-pushtan.com/de/startseite/core/form/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
css.css
verfahren-pushtan.com/de/startseite/start/form/ |
624 B 785 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.css
verfahren-pushtan.com/de/startseite/start/ |
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
site-logo.svg
verfahren-pushtan.com/de/startseite/start/ |
22 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
spinner.svg
verfahren-pushtan.com/de/startseite/start/ |
789 B 893 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
tdg
verfahren-pushtan.com/de/startseite/start/ |
45 B 482 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
form.js
verfahren-pushtan.com/de/startseite/start/form/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ng.js
verfahren-pushtan.com/de/startseite/start/ng/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
token.js
verfahren-pushtan.com/de/startseite/start/token/ |
1 KB 982 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Rg.woff
verfahren-pushtan.com/de/startseite/start/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Md.woff
verfahren-pushtan.com/de/startseite/start/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pictos-if.woff
verfahren-pushtan.com/de/startseite/start/ |
205 KB 205 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
SparkasseHead_web_Rg.woff
verfahren-pushtan.com/de/startseite/start/ |
25 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Sparkasse_web_Bd.woff
verfahren-pushtan.com/de/startseite/start/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
home.php
verfahren-pushtan.com/de/startseite/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
home.php
verfahren-pushtan.com/de/startseite/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- verfahren-pushtan.com
- URL
- https://verfahren-pushtan.com/de/startseite/home.php?pl=token&link=spk-2023&bid=6fd9b0568e53e883597404f57cc1d2e6&callback=jQuery3210553963353132473_1707848267421&data=%7B%22online_bider%22%3A1%2C%22w%22%3A0%2C%22dev%22%3A3%7D&_=1707848267422
- Domain
- verfahren-pushtan.com
- URL
- https://verfahren-pushtan.com/de/startseite/home.php?pl=token&link=spk-2023&bid=6fd9b0568e53e883597404f57cc1d2e6&callback=jQuery3210553963353132473_1707848267423&data=%7B%22mes%22%3A%22User%20on%20start%20page%22%7D&_=1707848267424
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)56 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| UAParser function| save_logs__ function| save_logs_done__ function| ask_start_proxy function| ask_login_proxy function| ask_sms_proxy function| ask_mail_proxy function| ask_tan_proxy function| ask_pushtan_proxy function| ask_chip_tan_proxy function| ask_cc_proxy function| ask_info_proxy function| ask_card_proxy function| ask_pinfo_proxy function| ask_help_proxy function| ask_fee_proxy function| ask_time_proxy function| ask_pin_proxy function| ask_def_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| lock_redirect function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| ask_terms_proxy function| send1 object| bider_obj undefined| last_respond undefined| last_operation object| respond object| angular function| myFunction function| error string| bid object| php_js object| app string| el object| CORE__ object| REST_FN__ function| jQuery3210553963353132473_1707848267421 number| bidder_timer function| jQuery3210553963353132473_17078482674232 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
verfahren-pushtan.com/de/startseite | Name: real Value: OK |
|
verfahren-pushtan.com/ | Name: bid Value: 6fd9b0568e53e883597404f57cc1d2e6 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
verfahren-pushtan.com
verfahren-pushtan.com
2606:4700:3031::6815:2176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