dkb-banking.de--1vhost144087.lowhost.ru
Open in
urlscan Pro
46.173.221.33
Malicious Activity!
Public Scan
Effective URL: http://dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/meine.Anmelden.php?cgi_auth=AfsEmPrS1fM3qjZf7HOQ5HWxgr7YI0Nd5JXnyd4mm90VBUkS...
Submission Tags: 6923962
Submission: On January 16 via api from NL
Summary
This is the only time dkb-banking.de--1vhost144087.lowhost.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DKB (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 46.173.221.33 46.173.221.33 | 56364 (GPI-AS) (GPI-AS) | |
1 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
lowhost.ru
1 redirects
dkb-banking.de--1vhost144087.lowhost.ru |
452 KB |
1 | 1 |
Domain | Requested by | |
---|---|---|
2 | dkb-banking.de--1vhost144087.lowhost.ru | 1 redirects |
1 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/meine.Anmelden.php?cgi_auth=AfsEmPrS1fM3qjZf7HOQ5HWxgr7YI0Nd5JXnyd4mm90VBUkSOnq1bYb9Du70buUgP9iH1DpvEMv7g7A31XohGMB1q4wLCSCMas0e5XZqtPXJYYD69MP
Frame ID: 5463CD9594DE71583A8D2580CBE0DC45
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/
HTTP 302
http://dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/meine.Anmelden.php?cgi_auth=AfsEmPrS1fM3qjZf7HOQ5HWxgr7Y... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/
HTTP 302
http://dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/meine.Anmelden.php?cgi_auth=AfsEmPrS1fM3qjZf7HOQ5HWxgr7YI0Nd5JXnyd4mm90VBUkSOnq1bYb9Du70buUgP9iH1DpvEMv7g7A31XohGMB1q4wLCSCMas0e5XZqtPXJYYD69MP Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
meine.Anmelden.php
dkb-banking.de--1vhost144087.lowhost.ru/banking/Weiter/home/ Redirect Chain
|
451 KB 452 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
37 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
208 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
686 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
944 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
669 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
864 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
871 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DKB (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dkb-banking.de--1vhost144087.lowhost.ru
46.173.221.33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