magical-williams.45-81-252-79.plesk.page
Open in
urlscan Pro
45.81.252.79
Malicious Activity!
Public Scan
Effective URL: https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/delogin.w.php?logint=...
Submission: On September 27 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by R3 on September 19th 2021. Valid for: 3 months.
This is the only time magical-williams.45-81-252-79.plesk.page was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 103.141.96.101 103.141.96.101 | 2519 (VECTANT A...) (VECTANT ARTERIA Networks Corporation) | |
4 16 | 45.81.252.79 45.81.252.79 | 212853 (REDFOXCLOUD) (REDFOXCLOUD) | |
2 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 3 |
ASN2519 (VECTANT ARTERIA Networks Corporation, JP)
PTR: sv10740.xserver.jp
wildknights.jp |
ASN212853 (REDFOXCLOUD, LT)
PTR: 79.i01.rfox.cloud
magical-williams.45-81-252-79.plesk.page |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
plesk.page
4 redirects
magical-williams.45-81-252-79.plesk.page |
256 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
35 KB |
2 |
wildknights.jp
2 redirects
wildknights.jp |
198 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
27 KB |
15 | 4 |
Domain | Requested by | |
---|---|---|
16 | magical-williams.45-81-252-79.plesk.page |
4 redirects
magical-williams.45-81-252-79.plesk.page
|
2 | maxcdn.bootstrapcdn.com |
magical-williams.45-81-252-79.plesk.page
|
2 | wildknights.jp | 2 redirects |
1 | cdnjs.cloudflare.com |
magical-williams.45-81-252-79.plesk.page
|
15 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ing.de |
ing.de |
www.facebook.com |
www.instagram.com |
www.youtube.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
magical-williams.45-81-252-79.plesk.page R3 |
2021-09-19 - 2021-12-18 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-03-01 - 2022-02-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/delogin.w.php?logint=https.access.lng.deelogin
Frame ID: CFD61F2D864885D49FF868B4CEA3F81B
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
ING LoginPage URL History Show full URLs
-
https://wildknights.jp/web
HTTP 301
https://wildknights.jp/web/ HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/ HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/c/index.php?accessoauth=976heaqzSHCbbTwM4kUYo5TUKDzqZW4uoqLAiqrSz48zZuL5qP... HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY HTTP 301
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/ HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/d... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
- jquery[.-]([\d.]*\d)[^/]*\.js
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: www.ing.de
Search URL Search Domain Scan URL
Title: Weitere Informationen zur Online-Sicherheit und zu unserem ING-Sicherheitsversprechen
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://wildknights.jp/web
HTTP 301
https://wildknights.jp/web/ HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/ HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/c/index.php?accessoauth=976heaqzSHCbbTwM4kUYo5TUKDzqZW4uoqLAiqrSz48zZuL5qPgX8oxWKJ6wCm6b9ZcPLVJM6doub58D0rBQq1EVTlVQqhHsylApl6UqQGOEc1tjXNf HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY HTTP 301
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/ HTTP 302
https://magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/delogin.w.php?logint=https.access.lng.deelogin Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
delogin.w.php
magical-williams.45-81-252-79.plesk.page/w/c/E6JVsFaTlypzF73qJ1dMG8OJXmwbSEn8PNckReRRaUUMPPHbcXrCr2EeQnprhfUfDRbXBY/ Redirect Chain
|
18 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.2.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BusyIndicator-ver-B7F2943258D5A2E62FFE465B6AD641A2.css
magical-williams.45-81-252-79.plesk.page/w/w/r/VKm5bDmxSHbPLiQLrfgP3bo9xcwevgvkDAmyD5uB4JAtfY4I3KY4XRR5_lSiJ6RiPxRE_SxnAtyVppSR0aYsPbglAJZngvyeMyEcIqpEI7o/resource/ |
1 KB 662 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bundle.ibbr-ver-5BC744A4F66761D06B9D9837E455402F.css
magical-williams.45-81-252-79.plesk.page/w/w/r/Tqc6Tr3PWL7G6NO5SRhRsmt9OFV5laCTHcBraujKicSbeJC/webjars/uilib/5.4.0/stylesheets/ |
972 KB 97 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.5.1.min-ver-DC5E7F18C8D36AC1D3D4753A87C98D0A.js
magical-williams.45-81-252-79.plesk.page/w/w//r/VKm5bDmxSHZML-YdxKpKr7XSL9jaoc3HZmHDyQAjW1RTVWgGOYrzwzCnpERs8I4VqxiihE84Vywxd8bxAN9jQ4-G6SmcU7JCwa3eI1vOKes/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wicket-ajax-jquery-ver-3A8C326A8436172FC95523D517EBC88B.js
magical-williams.45-81-252-79.plesk.page/w/w//r/E5CXRDQkt-CNdxsbYj7-K4V2gxNKmXPeqQsC34J67hMEVq6ZzbkDphdCiNXzi-Pit7OLKJqRk-A/res/js/ |
43 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
busy-ver-4D2D1F7E8CC690A90A4C9CE1EB6941FE.js
magical-williams.45-81-252-79.plesk.page/w/w//r/VKm5bDmxSHbPLiQLrfgP3bo9xcwevgvkDAmyD5uB4JCQEDLa64o3OfMD7JltH4KRTg0NqTUxX-H2xnxs2nnnFg/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
webtrekk_v4.min-ver-C9A39FAA8326E8CD878F568941919B81.js
magical-williams.45-81-252-79.plesk.page/w/w//r/VKm5bDmxSHZML-YdxKpKr7XSL9jaoc3HDeHVKeopbmKdIdCus1BNCymqUTndyOKdUFUB-dCuEmd40hx1bIOu8w/ |
63 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bundle.all-ver-2AF0C1EB180674C1FE86FE9A0D8BC311.js
magical-williams.45-81-252-79.plesk.page/w/w//r/Tqc6Tr3PWL7G6NO5SRhRsmt9OFV5laCTHcBraujKicSbeJCiufnK_jN4Y2U02Zk9X8Pr63Jy4tavU344TrnFLWF5vIGomkDHBVENx4RZ8avEihz6ooyXkw/webjars/uilib/5.4.0/javascripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bundle.all-ver-2AF0C1EB180674C1FE86FE9A0D8BC311.js
magical-williams.45-81-252-79.plesk.page/w/w//r/Tqc6Tr3PWL7G6NO5SRhRsmt9OFV5laCTHcBraujKicSbeJCiufnK_jN4Y2U02Zk9X8Pr63Jy4tavU344TrnFLWF5vIGomkDHBVENx4RZ8avEihz6ooyXkw/webjars/uilib/5.4.0/javascripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ING_Deutschland_NoClaim.svg
magical-williams.45-81-252-79.plesk.page/w/w/r/Tqc6Tr3PWL7G6NO5SRhRsmt9OFV5laCTHcBraujKicSbeJCiufnK_jN4Y2U02Zk9momlk0s4J6JlZjTwgA42my3nAAsxfVCta4F0LAjmoQI/webjars/uilib/5.4.0/images/ |
16 KB 16 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
INGMeWeb-Regular.html
magical-williams.45-81-252-79.plesk.page/w/w/r/Tqc6Tr3PWL7G6NO5SRhRsmt9OFV5laCTHcBraujKicSbeJCiufnK_jN4Y2U02Zk9momlk0s4J6JlZjTwgA42my3nAAsxfVCta4F0LAjmoQI/webjars/uilib/5.4.0/stylesheets/webfonts/ |
29 KB 29 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icons.woff
magical-williams.45-81-252-79.plesk.page/w/w/r/Tqc6Tr3PWL7G6NO5SRhRsmt9OFV5laCTHcBraujKicSbeJCiufnK_jN4Y2U02Zk9momlk0s4J6JlZjTwgA42my3nAAsxfVCta4F0LAjmoQI/webjars/uilib/5.4.0/stylesheets/webfonts/ |
44 KB 45 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| bootstrap function| $ function| jQuery function| checkStatus function| checkUserLoggedIN object| Wicket object| RequestBlocker undefined| wts undefined| wt_safetagConfig object| webtrekkUnloadObjects object| webtrekkLinktrackObjects object| webtrekkHeatmapObjects function| WebtrekkV3 function| webtrekkV30 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
magical-williams.45-81-252-79.plesk.page
maxcdn.bootstrapcdn.com
wildknights.jp
103.141.96.101
2606:4700::6810:135e
2606:4700::6812:bcf
45.81.252.79
2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d
36667ffd03b80dc8203f271c84ffb4a652a1c85f2f21c2d7d4bc4b8b29a88847
3fc18c3d98c4245afbb3d987be0fc53041681dfcd5903381fe34179048c2a520
4e4beac4af0b0b7f2b76605ca8632af088d6cba701dbc41590d69193f1e8820a
6ec717990a3a4785b82bb8651458fb407182dbed728f1c69742c395b558577eb
814d708ae7117c643892517043641d0802ae58402b8eacab4b52084321fc9ec4
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
8ddbd21ff8ee7dd4c290475730e68210e406b31ee7de1aa0be06661f9d32f77e
9a214e9df938fbc09d96e47ae4dbe031d7a581647a87c38ec371bc2a2d4dc7cf
b5830f800a89c19deb7763881cabba52e7b617ea74b983aa4f8a95bb06b83454
ce4fef24999f16d02bad5e3de79659c51b7b7b94e0121ccad9e084482c38bf4f
e7ed36ceee5450b4243bbc35188afabdfb4280c7c57597001de0ed167299b01b
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d