mein-banking.dkbbe.com
Open in
urlscan Pro
2a06:98c1:3121::3
Malicious Activity!
Public Scan
Effective URL: https://mein-banking.dkbbe.com/de/de/access/delogin/login.php
Submission: On January 25 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on December 26th 2023. Valid for: 3 months.
This is the only time mein-banking.dkbbe.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking) Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 13 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 3 |
ASN13335 (CLOUDFLARENET, US)
ffr-edelstahl.de | |
mein-banking.dkbbe.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
dkbbe.com
1 redirects
mein-banking.dkbbe.com |
275 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
35 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1019 |
14 KB |
1 |
ffr-edelstahl.de
1 redirects
ffr-edelstahl.de |
683 B |
14 | 4 |
Domain | Requested by | |
---|---|---|
12 | mein-banking.dkbbe.com |
1 redirects
mein-banking.dkbbe.com
|
2 | cdnjs.cloudflare.com |
mein-banking.dkbbe.com
|
1 | maxcdn.bootstrapcdn.com |
mein-banking.dkbbe.com
|
1 | ffr-edelstahl.de | 1 redirects |
14 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dkbbe.com GTS CA 1P5 |
2023-12-26 - 2024-03-25 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2023-11-30 - 2024-02-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mein-banking.dkbbe.com/de/de/access/delogin/login.php
Frame ID: B7ECC19731C903C9E9DFA9E92F663E43
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
ING LoginPage URL History Show full URLs
-
http://ffr-edelstahl.de/
HTTP 301
https://mein-banking.dkbbe.com/de/de/access/delogin/login.php Page URL
-
https://mein-banking.dkbbe.com/cdn-cgi/phish-bypass?atok=zXXWFZj54eKfWnjcV1nlzOLJz38FpUrX7fOMJFUM9Ug-170616...
HTTP 301
https://mein-banking.dkbbe.com/de/de/access/delogin/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ffr-edelstahl.de/
HTTP 301
https://mein-banking.dkbbe.com/de/de/access/delogin/login.php Page URL
-
https://mein-banking.dkbbe.com/cdn-cgi/phish-bypass?atok=zXXWFZj54eKfWnjcV1nlzOLJz38FpUrX7fOMJFUM9Ug-1706169150-0-%2Fde%2Fde%2Faccess%2Fdelogin%2Flogin.php
HTTP 301
https://mein-banking.dkbbe.com/de/de/access/delogin/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://ffr-edelstahl.de/ HTTP 301
- https://mein-banking.dkbbe.com/de/de/access/delogin/login.php
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
login.php
mein-banking.dkbbe.com/de/de/access/delogin/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
mein-banking.dkbbe.com/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
mein-banking.dkbbe.com/cdn-cgi/images/ |
452 B 540 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
mein-banking.dkbbe.com/de/de/access/delogin/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bundle.css
mein-banking.dkbbe.com/de/de/access/delogin/css/ |
1 MB 121 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qrl-ver-A4288F3F0CE7F5C60C76A005C363B0A2.svg
mein-banking.dkbbe.com/de/de/access/delogin/css/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qrlhint-ver-916FDE8A4CA8095FC339D6829D7D6723.png
mein-banking.dkbbe.com/de/de/access/delogin/css/ |
44 KB 44 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/1.6.1/ |
89 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.validate.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/ |
23 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ING_Deutschland_NoClaim.svg
mein-banking.dkbbe.com/de/de/access/delogin/css/ |
16 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
INGMeWeb-Bold.woff2
mein-banking.dkbbe.com/de/de/access/delogin/css/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
INGMeWeb-Regular.woff2
mein-banking.dkbbe.com/de/de/access/delogin/css/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icons.woff
mein-banking.dkbbe.com/de/de/access/delogin/css/webfonts/ |
32 KB 32 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking) Generic Cloudflare (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.mein-banking.dkbbe.com/ | Name: __cf_mw_byp Value: zXXWFZj54eKfWnjcV1nlzOLJz38FpUrX7fOMJFUM9Ug-1706169150-0-/de/de/access/delogin/login.php |
|
mein-banking.dkbbe.com/ | Name: PHPSESSID Value: e2a8ac9f9c18c340a9301967b1317d29 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
ffr-edelstahl.de
maxcdn.bootstrapcdn.com
mein-banking.dkbbe.com
2606:4700::6811:180e
2606:4700::6812:bcf
2a06:98c1:3121::3
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
2595841c89edda3fc1d8b0cf3876e8c97f745c6b69b499586955e79b1f868325
305948d72ce8577a386f77079dacdb6841f18668f64cc7865a196a0624e5b5a8
3a135f82b209a59959b162a1fbc9b0b38856d1332af286f86046b06357b3811e
50e497b00818378dcffe856b994f89947b620c66163768879c9b8a63d583f898
9a214e9df938fbc09d96e47ae4dbe031d7a581647a87c38ec371bc2a2d4dc7cf
9d0ce0dd87e2d9bc4171914be7b288f8388ce7c26dc58e0a465a82760e899914
c784376960f3163dc760bc019e72e5fed78203745a5510c69992a39d1d8fe776
cad22e7e700ceb41a9dc593c1d0b5d8c0ad12fb0b3a725126177e5e6f2eb365c
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016
f74c344733a85af20d2754b208f12309e2a30c591795d0881cb0ad94c4be6155
fb6ebe23316c03fd8d25e871bfdd9c41eb77e14115f5a01e3e0d97b94617779e
fb8d407e442bfe63d6a15073f359c02b21e9a4018c1ff0f086dad915ab6043e3