gukff.from-mn.com
Open in
urlscan Pro
135.148.113.163
Malicious Activity!
Public Scan
Effective URL: https://gukff.from-mn.com/qeun/
Submission: On February 21 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 18th 2024. Valid for: 3 months.
This is the only time gukff.from-mn.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DKB (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 132.226.44.1 132.226.44.1 | 31898 (ORACLE-BM...) (ORACLE-BMC-31898) | |
1 | 135.148.113.163 135.148.113.163 | 16276 (OVH) (OVH) | |
1 | 2 |
ASN16276 (OVH, FR)
PTR: ip163.ip-135-148-113.us
gukff.from-mn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
from-mn.com
gukff.from-mn.com |
194 KB |
1 |
dontexist.net
1 redirects
vjh.dontexist.net |
154 B |
1 | 2 |
Domain | Requested by | |
---|---|---|
1 | gukff.from-mn.com | |
1 | vjh.dontexist.net | 1 redirects |
1 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
gukff.from-mn.com R3 |
2024-02-18 - 2024-05-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://gukff.from-mn.com/qeun/
Frame ID: 71BFCA3512722F0BDEA3410CFC139EB9
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
DKB - Deutsche Kreditbank AG - Internet BankingPage URL History Show full URLs
-
http://vjh.dontexist.net/
HTTP 302
https://gukff.from-mn.com/qeun/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://vjh.dontexist.net/
HTTP 302
https://gukff.from-mn.com/qeun/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
gukff.from-mn.com/qeun/ Redirect Chain
|
744 KB 194 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
22 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DKB (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| savepage_ShadowLoader0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gukff.from-mn.com
vjh.dontexist.net
132.226.44.1
135.148.113.163
04de149751276069b2c581032afc9c43bf176fe06868a1f2147f3935b8ad116b
2902e0719666652d32ea1fcd977ca180db7297543a3fdf6d4385a8b5073778d2
3fadfc70661c394dc68865f28bc889aeff26b251c6994cafbecc2300168c09ad
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
9cddd6352a3c455a6553ab2c7959827c2f89b1043c4e81e47b7631dcde06cf7f
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc