losta-v09.cf
Open in
urlscan Pro
51.75.15.74
Malicious Activity!
Public Scan
Effective URL: https://losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/
Submission: On July 16 via manual from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 14th 2019. Valid for: 3 months.
This is the only time losta-v09.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Rabobank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 54.209.98.134 54.209.98.134 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
2 2 | 45.40.140.1 45.40.140.1 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
1 1 | 165.22.64.183 165.22.64.183 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
3 6 | 51.75.15.74 51.75.15.74 | 16276 (OVH) (OVH) | |
3 | 1 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-209-98-134.compute-1.amazonaws.com
rebrand.ly |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-45-40-140-1.ip.secureserver.net
x.co |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
getyucky.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
losta-v09.cf
3 redirects
losta-v09.cf |
822 KB |
2 |
x.co
2 redirects
x.co |
295 B |
1 |
getyucky.com
1 redirects
getyucky.com |
252 B |
1 |
rebrand.ly
1 redirects
rebrand.ly |
282 B |
3 | 4 |
Domain | Requested by | |
---|---|---|
6 | losta-v09.cf |
3 redirects
losta-v09.cf
|
2 | x.co | 2 redirects |
1 | getyucky.com | 1 redirects |
1 | rebrand.ly | 1 redirects |
3 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
losta-v09.cf cPanel, Inc. Certification Authority |
2019-07-14 - 2019-10-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/
Frame ID: 37E5DF33CA7AEB3919B375A120BC3432
Requests: 3 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://rebrand.ly/3489rhne
HTTP 301
http://x.co/e3r4dsdwed HTTP 301
https://x.co/e3r4dsdwed HTTP 302
https://getyucky.com/rabs/wplek.php HTTP 302
https://losta-v09.cf/bankieren.rabo-omgevingskeuze HTTP 301
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/ HTTP 302
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e HTTP 301
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rebrand.ly/3489rhne
HTTP 301
http://x.co/e3r4dsdwed HTTP 301
https://x.co/e3r4dsdwed HTTP 302
https://getyucky.com/rabs/wplek.php HTTP 302
https://losta-v09.cf/bankieren.rabo-omgevingskeuze HTTP 301
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/ HTTP 302
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e HTTP 301
https://losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/ Redirect Chain
|
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aanvraag_starten.png
losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.png
losta-v09.cf/bankieren.rabo-omgevingskeuze/2138e5b5df99e4a9275c6c652e12138e/ |
816 KB 817 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Rabobank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
losta-v09.cf/ | Name: PHPSESSID Value: f0ef8bf749ba94cd13ba55e32b734acd |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
getyucky.com
losta-v09.cf
rebrand.ly
x.co
165.22.64.183
45.40.140.1
51.75.15.74
54.209.98.134
38f13e791eaad54eb1a24a450ea216863feb70dd5a67def01a2cee57a74a5dc5
c826356b3980f89f2dfc82a3f755a1f4a0afc4e2ea989ef35d367887facf7929
ce9e9c6ffe954351bba323c520de0c7777218f931fb95f14850fdd2c406c8710