veelmoorstpa.xyz
Open in
urlscan Pro
136.144.41.67
Malicious Activity!
Public Scan
Effective URL: http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/login/
Submission: On September 26 via api from US — Scanned from DE
Summary
This is the only time veelmoorstpa.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Nordea (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 30 | 136.144.41.67 136.144.41.67 | 211252 (AS_DELIS) (AS_DELIS) | |
28 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
30 |
veelmoorstpa.xyz
2 redirects
veelmoorstpa.xyz |
199 KB |
28 | 1 |
Domain | Requested by | |
---|---|---|
30 | veelmoorstpa.xyz |
2 redirects
veelmoorstpa.xyz
|
28 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/login/
Frame ID: 08E09894100551F7B0A85D2A3A25503A
Requests: 28 HTTP requests in this frame
Screenshot
Page Title
Nordea - AuthenticationPage URL History Show full URLs
- http://veelmoorstpa.xyz/nordea/a/1/ Page URL
-
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9
HTTP 301
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/ HTTP 302
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/login/ Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://veelmoorstpa.xyz/nordea/a/1/ Page URL
-
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9
HTTP 301
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/ HTTP 302
http://veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
veelmoorstpa.xyz/nordea/a/1/ |
728 B 725 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
veelmoorstpa.xyz/nordea/a/1/a1b2c3/3d4e3e26d94caf7b8faf72f497e429f9/login/ Redirect Chain
|
17 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
veelmoorstpa.xyz/nordea/a/1/bower_components/jquery/dist/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
veelmoorstpa.xyz/nordea/a/1/bower_components/ua-parser-js/dist/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
veelmoorstpa.xyz/nordea/a/1/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
veelmoorstpa.xyz/nordea/a/1/core/form/ |
19 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_token.js
veelmoorstpa.xyz/nordea/a/1/core/token/ |
14 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
veelmoorstpa.xyz/nordea/a/1/bower_components/angular/ |
165 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.min.js
veelmoorstpa.xyz/nordea/a/1/bower_components/jquery.maskedinput/dist/ |
16 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
veelmoorstpa.xyz/nordea/a/1/core/form/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
veelmoorstpa.xyz/nordea/a/1/login/form/ |
0 280 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
reset.css
veelmoorstpa.xyz/nordea/a/1/login/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backbase-portal.css
veelmoorstpa.xyz/nordea/a/1/login/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.css
veelmoorstpa.xyz/nordea/a/1/login/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aurora.min.css
veelmoorstpa.xyz/nordea/a/1/login/ |
21 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles-6af237f07b117508ecc428f538073c25.css
veelmoorstpa.xyz/nordea/a/1/login/ |
36 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
service-break-f426cda35f41e4c0b7c30c814b5eb2ee.svg
veelmoorstpa.xyz/nordea/a/1/login/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
codes_app-a89defc476c5ea3f806b6f5360157e81.svg
veelmoorstpa.xyz/nordea/a/1/login/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
offline-8599dbe5088e0566b0e39373d3a56b60.svg
veelmoorstpa.xyz/nordea/a/1/login/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
code_calculator-6af4aa53625a02dcb8b5cfd7ac2d30bd.svg
veelmoorstpa.xyz/nordea/a/1/login/ |
671 B 959 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
veelmoorstpa.xyz/nordea/a/1/login/form/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng.js
veelmoorstpa.xyz/nordea/a/1/login/ng/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
token.js
veelmoorstpa.xyz/nordea/a/1/login/token/ |
1 KB 910 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
564d0ff0f3578b7128a458ef269b286a.jpg
veelmoorstpa.xyz/nordea/a/1/login/ |
278 B 278 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c233a817ad142919d728ebf4c8b3d54c.woff2
veelmoorstpa.xyz/nordea/a/1/login/ |
26 KB 27 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7bc117ce8cbf2ce4b08a7ed17d16cf89.woff2
veelmoorstpa.xyz/nordea/a/1/login/ |
26 KB 26 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
veelmoorstpa.xyz/nordea/a/1/ |
57 B 252 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
veelmoorstpa.xyz/nordea/a/1/ |
57 B 252 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Nordea (Banking)46 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery function| UAParser function| save_logs__ function| save_logs_done__ function| ask_login_proxy function| ask_sms_proxy function| ask_pin_proxy function| ask_cc_proxy function| ask_mobc_proxy function| ask_readme_proxy function| ask_login2_proxy function| ask_login_resp_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| lock_redirect function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond object| angular string| bid object| php_js object| app object| loader_ string| el object| CORE__ object| REST_FN__ number| bidder_timer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
veelmoorstpa.xyz/nordea/a/1 | Name: real Value: OK |
|
veelmoorstpa.xyz/ | Name: bid Value: 3d4e3e26d94caf7b8faf72f497e429f9 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
veelmoorstpa.xyz
136.144.41.67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