www.kunden-1anmeldungs.com
Open in
urlscan Pro
2606:4700:30::6812:2f2f
Malicious Activity!
Public Scan
Effective URL: https://www.kunden-1anmeldungs.com/login-online-banking.html?240347230402=iHdA9A3d31FTd6Y&072397422255206533=JUskXGnZlhcr&222551204520
Submission: On November 10 via automatic, source phishtank
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on November 9th 2019. Valid for: a year.
This is the only time www.kunden-1anmeldungs.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sparkasse (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 104.27.131.29 104.27.131.29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 45.55.53.198 45.55.53.198 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
2 13 | 2606:4700:30:... 2606:4700:30::6812:2f2f | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
11 | 1 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
PTR: taveo.net
tav.so |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.kunden-1anmeldungs.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
kunden-1anmeldungs.com
2 redirects
www.kunden-1anmeldungs.com |
195 KB |
1 |
tav.so
1 redirects
tav.so |
250 B |
1 |
bitl.bid
1 redirects
bitl.bid |
188 B |
11 | 3 |
Domain | Requested by | |
---|---|---|
13 | www.kunden-1anmeldungs.com |
2 redirects
www.kunden-1anmeldungs.com
|
1 | tav.so | 1 redirects |
1 | bitl.bid | 1 redirects |
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-11-09 - 2020-10-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.kunden-1anmeldungs.com/login-online-banking.html?240347230402=iHdA9A3d31FTd6Y&072397422255206533=JUskXGnZlhcr&222551204520
Frame ID: C85270646FFFD2566C7B01A384126CA1
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bitl.bid/CkA8v1
HTTP 301
http://tav.so/QCCfP HTTP 301
http://www.kunden-1anmeldungs.com/einloggen/verifizierung HTTP 301
https://www.kunden-1anmeldungs.com/einloggen/verifizierung HTTP 302
https://www.kunden-1anmeldungs.com/login-online-banking.html?240347230402=iHdA9A3d31FTd6Y&072397422255206533=JU... Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bitl.bid/CkA8v1
HTTP 301
http://tav.so/QCCfP HTTP 301
http://www.kunden-1anmeldungs.com/einloggen/verifizierung HTTP 301
https://www.kunden-1anmeldungs.com/einloggen/verifizierung HTTP 302
https://www.kunden-1anmeldungs.com/login-online-banking.html?240347230402=iHdA9A3d31FTd6Y&072397422255206533=JUskXGnZlhcr&222551204520 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login-online-banking.html
www.kunden-1anmeldungs.com/ Redirect Chain
|
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZgIASneYWjYdzMVQVydKZF2H
www.kunden-1anmeldungs.com/ |
14 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZN4thiq008WyVBpOBED5z50
www.kunden-1anmeldungs.com/ |
9 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZWPDhzya9Aim8b22Jfmsk
www.kunden-1anmeldungs.com/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZKqbB5vomdZfBddxxbK7YG
www.kunden-1anmeldungs.com/ |
6 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZtI8dXuFi3xX1BsSt4D
www.kunden-1anmeldungs.com/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZfOIg8DnPqsiIKIIKRFj
www.kunden-1anmeldungs.com/ |
4 KB 1 KB |
Script
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZdJm8LgIBAPLSgffBasFYQ
www.kunden-1anmeldungs.com/ |
47 KB 47 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZLpdr0vMnxtBLeRo1B88V
www.kunden-1anmeldungs.com/ |
39 KB 39 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZPm9Hv4K7FLy9SJQozS39I5d
www.kunden-1anmeldungs.com/ |
27 KB 27 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZoVvFCpMITLRws5mSXMud
www.kunden-1anmeldungs.com/ |
39 KB 39 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sparkasse (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| ZQho6CPKpm5Ce6VFMaNoa6bY function| ZSyaD7OvB89gec6srTD4rbKW2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.kunden-1anmeldungs.com/ | Name: PHPSESSID Value: b59t1hng5p4fd8en46je4hlje6 |
|
.kunden-1anmeldungs.com/ | Name: __cfduid Value: d8b5f4e02f073d54ffead542e4238788f1573353185 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bitl.bid
tav.so
www.kunden-1anmeldungs.com
104.27.131.29
2606:4700:30::6812:2f2f
45.55.53.198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