Submitted URL: http://tsf.blogdns.com/
Effective URL: https://opcfr.dns.army/de/
Submission: On January 23 via automatic, source openphish — Scanned from JP

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 1 HTTP transactions. The main IP is 51.81.69.85, located in United States and belongs to OVH, FR. The main domain is opcfr.dns.army.
TLS certificate: Issued by R3 on January 20th 2024. Valid for: 3 months.
This is the only time opcfr.dns.army was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DKB (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 168.138.216.227 31898 (ORACLE-BM...)
1 51.81.69.85 16276 (OVH)
1 2
Apex Domain
Subdomains
Transfer
1 dns.army
opcfr.dns.army
194 KB
1 blogdns.com
tsf.blogdns.com
149 B
1 2
Domain Requested by
1 opcfr.dns.army
1 tsf.blogdns.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
opcfr.dns.army
R3
2024-01-20 -
2024-04-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://opcfr.dns.army/de/
Frame ID: 848A3EC3384C2958DBE0ABC439E9302E
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

DKB - Deutsche Kreditbank AG - Internet Banking

Page URL History Show full URLs

  1. http://tsf.blogdns.com/ HTTP 302
    https://opcfr.dns.army/de/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

221 kB
Transfer

802 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://tsf.blogdns.com/ HTTP 302
    https://opcfr.dns.army/de/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
opcfr.dns.army/de/
Redirect Chain
  • http://tsf.blogdns.com/
  • https://opcfr.dns.army/de/
744 KB
194 KB
Document
General
Full URL
https://opcfr.dns.army/de/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
51.81.69.85 , United States, ASN16276 (OVH, FR),
Reverse DNS
ip85.ip-51-81-69.us
Software
nginx / PHP/7.4.33 PleskLin
Resource Hash
2902e0719666652d32ea1fcd977ca180db7297543a3fdf6d4385a8b5073778d2

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Tue, 23 Jan 2024 01:23:53 GMT
server
nginx
vary
Accept-Encoding
x-powered-by
PHP/7.4.33 PleskLin

Redirect headers

Connection
keep-alive
Date
Tue, 23 Jan 2024 01:23:49 GMT
Location
https://opcfr.dns.army/de/
Transfer-Encoding
chunked
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9cddd6352a3c455a6553ab2c7959827c2f89b1043c4e81e47b7631dcde06cf7f

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
22 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04de149751276069b2c581032afc9c43bf176fe06868a1f2147f3935b8ad116b

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3fadfc70661c394dc68865f28bc889aeff26b251c6994cafbecc2300168c09ad

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775

Request headers

Referer
Origin
https://opcfr.dns.army
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c

Request headers

Referer
Origin
https://opcfr.dns.army
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
9 KB
9 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc

Request headers

Referer
Origin
https://opcfr.dns.army
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.224 Safari/537.36

Response headers

Content-Type
font/woff2

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DKB (Banking)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader

0 Cookies