pakketpost.info
Open in
urlscan Pro
81.29.134.72
Malicious Activity!
Public Scan
Effective URL: https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/start/
Submission: On May 27 via manual from NL
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 26th 2020. Valid for: 3 months.
This is the only time pakketpost.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Regiobank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 26 | 81.29.134.72 81.29.134.72 | 12555 (IMAQLIQ h...) (IMAQLIQ https://iqdata.center) | |
21 | 2 |
ASN12555 (IMAQLIQ https://iqdata.center, RU)
PTR: host-81-29-134-72.iqdata.center
pakketpost.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
pakketpost.info
5 redirects
pakketpost.info |
706 KB |
21 | 1 |
Domain | Requested by | |
---|---|---|
26 | pakketpost.info |
5 redirects
pakketpost.info
|
21 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
pakketpost.info Let's Encrypt Authority X3 |
2020-05-26 - 2020-08-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/start/
Frame ID: F6A475D178DA484E2A0A10C0BA320265
Requests: 22 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://pakketpost.info/regio
HTTP 301
http://pakketpost.info/regio/ HTTP 301
https://pakketpost.info/regio/ Page URL
-
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1
HTTP 301
http://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/ HTTP 301
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/ HTTP 302
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/start/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Angular (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+ ng-version="([\d.]+)"/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://pakketpost.info/regio
HTTP 301
http://pakketpost.info/regio/ HTTP 301
https://pakketpost.info/regio/ Page URL
-
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1
HTTP 301
http://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/ HTTP 301
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/ HTTP 302
https://pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/start/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://pakketpost.info/regio HTTP 301
- http://pakketpost.info/regio/ HTTP 301
- https://pakketpost.info/regio/
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
pakketpost.info/regio/ Redirect Chain
|
728 B 677 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
pakketpost.info/regio/a1b2c3/a05d0f9a47c9582118fc9f212656cbe1/start/ Redirect Chain
|
28 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
pakketpost.info/regio/bower_components/jquery/dist/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
pakketpost.info/regio/bower_components/ua-parser-js/dist/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
pakketpost.info/regio/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
pakketpost.info/regio/core/form/ |
43 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_token.js
pakketpost.info/regio/core/token/ |
10 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
pakketpost.info/regio/core/form/ |
3 KB 1006 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
pakketpost.info/regio/start/form/ |
0 231 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
reb.6afe04ee65a1e0e5ef45.css
pakketpost.info/regio/start/ |
76 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
pakketpost.info/regio/start/form/ |
3 KB 1010 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
pakketpost.info/regio/start/form/ |
3 KB 1010 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
token.js
pakketpost.info/regio/start/token/ |
1 KB 824 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular.woff
pakketpost.info/regio/start/ |
19 KB 19 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Whitney-Bold.otf
pakketpost.info/regio/start/ |
27 KB 27 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Semibold.woff
pakketpost.info/regio/start/ |
19 KB 20 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
newloader.gif
pakketpost.info/regio/start/form/ |
544 KB 544 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
20 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
pakketpost.info/ |
57 B 204 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
pakketpost.info/ |
57 B 204 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
pakketpost.info/ |
57 B 204 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
pakketpost.info/ |
57 B 204 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Regiobank (Banking)40 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| UAParser function| save_logs__ function| save_logs_done__ function| ask_digicode_proxy function| ask_digipass_proxy function| ask_token_proxy function| ask_def_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| lock_redirect function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond string| bid object| php_js object| loader_ string| el object| CORE__ object| REST_FN__ number| bidder_timer0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
pakketpost.info
81.29.134.72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