www.organicsteamweeding.com.au
Open in
urlscan Pro
122.201.127.17
Malicious Activity!
Public Scan
Submission: On October 22 via api from CA — Scanned from AU
Summary
TLS certificate: Issued by USERTrust RSA Domain Validation Secur... on January 18th 2024. Valid for: a year.
This is the only time www.organicsteamweeding.com.au was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BankID (Banking) Eika Gruppen (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 122.201.127.17 122.201.127.17 | 38719 (DREAMSCAP...) (DREAMSCAPE-AS-AP Dreamscape Networks Limited) | |
17 | 2 |
ASN38719 (DREAMSCAPE-AS-AP Dreamscape Networks Limited, AU)
PTR: ip7ac97f11.ipv4.syd02.ds.network
www.organicsteamweeding.com.au |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
organicsteamweeding.com.au
www.organicsteamweeding.com.au |
116 KB |
0 |
portalbank.no
Failed
www2.portalbank.no Failed |
|
17 | 2 |
Domain | Requested by | |
---|---|---|
16 | www.organicsteamweeding.com.au |
www.organicsteamweeding.com.au
|
0 | www2.portalbank.no Failed | |
17 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
organicsteamweeding.com.au USERTrust RSA Domain Validation Secure Server CA |
2024-01-18 - 2025-02-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.organicsteamweeding.com.au/xd/
Frame ID: 448C01FEDAB499D334EEE4FEE90D2207
Requests: 17 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.organicsteamweeding.com.au/xd/ |
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
eika-green.css
www.organicsteamweeding.com.au/xd/BankID_fichiers/ |
451 KB 90 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionicons.css
www.organicsteamweeding.com.au/xd/BankID_fichiers/ |
60 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.organicsteamweeding.com.au/xd/BankID_fichiers/ |
12 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
small_logo.jpg
www.organicsteamweeding.com.au/xd/BankID_fichiers/ |
8 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bundle.js
www.organicsteamweeding.com.au/xd/BankID_fichiers/ |
0 60 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Eika-Medium.woff2
www.organicsteamweeding.com.au/xd/fonts/Eika/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-medium.woff2
www.organicsteamweeding.com.au/xd/fonts/Roboto/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Eika-Bold.woff2
www.organicsteamweeding.com.au/xd/fonts/Eika/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-regular.woff2
www.organicsteamweeding.com.au/xd/fonts/Roboto/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Eika-Semibold.woff2
www.organicsteamweeding.com.au/xd/fonts/Eika/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Eika-Medium.woff
www.organicsteamweeding.com.au/xd/fonts/Eika/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Eika-Semibold.woff
www.organicsteamweeding.com.au/xd/fonts/Eika/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Eika-Bold.woff
www.organicsteamweeding.com.au/xd/fonts/Eika/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-regular.woff
www.organicsteamweeding.com.au/xd/fonts/Roboto/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-medium.woff
www.organicsteamweeding.com.au/xd/fonts/Roboto/ |
0 18 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
www2.portalbank.no/bankcontent/0770/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www2.portalbank.no
- URL
- https://www2.portalbank.no/bankcontent/0770/img/favicon.ico
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BankID (Banking) Eika Gruppen (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
10 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.organicsteamweeding.com.au
www2.portalbank.no
www2.portalbank.no
122.201.127.17
06951624d80fdda468d7efffb27c4de747d0650055b488b326a701cb3fd697b8
150c71c44d8cbb9aa42a45e0e616f7cd9cfd300e1f38216098278d39f4d06254
53ff8e25fd4202561b67b73bcf6245e6f8ecb1f4b45d5b3b92e1167428f7e479
72da2e711a056e074fae79a2e63a8e759f3843d267491b5d1e0068f3a8d56e97
9ec2c7e9e32b00406ff47a6b4352acb38f4aa2b68802cddcc8317ebbbe4b2c1b
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855