nw.uydfnw4.sa.com Open in urlscan Pro
209.126.10.18  Malicious Activity! Public Scan

URL: https://nw.uydfnw4.sa.com/auth/ref/
Submission: On November 18 via manual from DE — Scanned from IT

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 209.126.10.18, located in St Louis, United States and belongs to NL-811-40021, US. The main domain is nw.uydfnw4.sa.com.
TLS certificate: Issued by R10 on November 11th 2024. Valid for: 3 months.
This is the only time nw.uydfnw4.sa.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DKB (Banking)

Domain & IP information

IP Address AS Autonomous System
1 209.126.10.18 40021 (NL-811-40021)
1 2
Apex Domain
Subdomains
Transfer
1 sa.com
nw.uydfnw4.sa.com
715 KB
1 1
Domain Requested by
1 nw.uydfnw4.sa.com
1 1

This site contains links to these domains. Also see Links.

Domain
www.dkb.de
Subject Issuer Validity Valid
nw.uydfnw4.sa.com
R10
2024-11-11 -
2025-02-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://nw.uydfnw4.sa.com/auth/ref/
Frame ID: 095C7FD2B94911D2147026B203A49A3D
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Einloggen - DKB Banking

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

826 kB
Transfer

826 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
nw.uydfnw4.sa.com/auth/ref/
714 KB
715 KB
Document
General
Full URL
https://nw.uydfnw4.sa.com/auth/ref/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
209.126.10.18 St Louis, United States, ASN40021 (NL-811-40021, US),
Reverse DNS
vmi2265844.contaboserver.net
Software
Apache /
Resource Hash
65c2b99ec32de5fd770b9cb4c2c3b07511181a69007ff6fdc6ef194a8e13fb8d

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36

Response headers

Accept-Ranges
bytes
Connection
Keep-Alive
Content-Length
731447
Content-Type
text/html
Date
Mon, 18 Nov 2024 19:36:03 GMT
Keep-Alive
timeout=5, max=100
Last-Modified
Sat, 16 Nov 2024 18:26:26 GMT
Server
Apache
truncated
/
38 KB
38 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
cc785cdd4278b3c1f7b82cb0d88e02102384df793010b1b2d16fc05da26205f8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://nw.uydfnw4.sa.com
Referer

Response headers

Content-Type
font/woff2
truncated
/
37 KB
37 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5e4db856f6171b37d6c7d2799dc800fc42417bd565fcc7645115e69f5fdb7568

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://nw.uydfnw4.sa.com
Referer

Response headers

Content-Type
font/woff2
truncated
/
37 KB
37 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f9b700512a8764c21a2c5d4e83cf96ec7d113045fc36d240c4c32bdbe1925f66

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36
Origin
https://nw.uydfnw4.sa.com
Referer

Response headers

Content-Type
font/woff2

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DKB (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies