security-attempted-transfer.com Open in urlscan Pro
95.213.216.168  Malicious Activity! Public Scan

URL: http://security-attempted-transfer.com/onlinebanking/admin/
Submission: On March 26 via automatic, source openphish — Scanned from DE

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 6 HTTP transactions. The main IP is 95.213.216.168, located in Russian Federation and belongs to SELECTEL, RU. The main domain is security-attempted-transfer.com.
This is the only time security-attempted-transfer.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Phishkit Admin (Online)

Domain & IP information

IP Address AS Autonomous System
1 3 95.213.216.168 49505 (SELECTEL)
2 2606:4700::68... 13335 (CLOUDFLAR...)
1 2001:4de0:ac1... 20446 (STACKPATH...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
6 4
Apex Domain
Subdomains
Transfer
3 security-attempted-transfer.com
security-attempted-transfer.com
5 KB
2 bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2181
41 KB
1 jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 403
8 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 588
30 KB
6 4
Domain Requested by
3 security-attempted-transfer.com 1 redirects security-attempted-transfer.com
2 stackpath.bootstrapcdn.com security-attempted-transfer.com
1 cdn.jsdelivr.net security-attempted-transfer.com
1 code.jquery.com security-attempted-transfer.com
6 4

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-01-29 -
2023-01-29
a year crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh

This page contains 1 frames:

Primary Page: http://security-attempted-transfer.com/onlinebanking/admin/
Frame ID: 9FD4AC54BBB968A291C5CE110BB3369B
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

LIVE - ADMIN

Page URL History Show full URLs

  1. http://security-attempted-transfer.com/onlinebanking/admin HTTP 301
    http://security-attempted-transfer.com/onlinebanking/admin/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
  • bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Overall confidence: 100%
Detected patterns
  • //cdn\.jsdelivr\.net/

Page Statistics

6
Requests

67 %
HTTPS

75 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

84 kB
Transfer

326 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://security-attempted-transfer.com/onlinebanking/admin HTTP 301
    http://security-attempted-transfer.com/onlinebanking/admin/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
security-attempted-transfer.com/onlinebanking/admin/
Redirect Chain
  • http://security-attempted-transfer.com/onlinebanking/admin
  • http://security-attempted-transfer.com/onlinebanking/admin/
3 KB
3 KB
Document
General
Full URL
http://security-attempted-transfer.com/onlinebanking/admin/
Protocol
HTTP/1.1
Server
95.213.216.168 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
mta.bostonmassachusettssite.com.de
Software
Apache /
Resource Hash
cfb8824d96405e31f0d777aa1efad874ffd3f995c8c58f74c6b90b58006f704a

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Sat, 26 Mar 2022 13:07:10 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Connection
close
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Sat, 26 Mar 2022 13:07:09 GMT
Server
Apache
Location
http://security-attempted-transfer.com/onlinebanking/admin/
Content-Length
267
Connection
close
Content-Type
text/html; charset=iso-8859-1
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/
156 KB
25 KB
Stylesheet
General
Full URL
https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/css/bootstrap.min.css
Requested by
Host: security-attempted-transfer.com
URL: http://security-attempted-transfer.com/onlinebanking/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2ff5b959fa9f6b4b1d04d20a37d706e90039176ab1e2a202994d9580baeebfd6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://security-attempted-transfer.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36

Response headers

date
Sat, 26 Mar 2022 13:07:10 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
cdn-edgestorageid
601, 617
age
28809452
cdn-cachedat
2021-04-27 01:20:29
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Mon, 25 Jan 2021 22:04:09 GMT
server
cloudflare
cdn-requestpullcode
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/css; charset=utf-8
cdn-cache
HIT
vary
Accept-Encoding
cache-control
public, max-age=31919000
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cdn-requestid
7f65a3f61a45c7ec1b220f79febb8699
cf-ray
6f201b948fb201db-ZRH
cdn-requestcountrycode
CH
cdn-requestpullsuccess
True
jquery-3.4.1.min.js
code.jquery.com/
86 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.4.1.min.js
Requested by
Host: security-attempted-transfer.com
URL: http://security-attempted-transfer.com/onlinebanking/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:2b , Netherlands, ASN20446 (STACKPATH-CDN, US),
Reverse DNS
Software
nginx /
Resource Hash
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://security-attempted-transfer.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36

Response headers

date
Sat, 26 Mar 2022 13:07:10 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-15851"
vary
Accept-Encoding
x-hw
1648300030.dop097.fr8.t,1648300030.cds203.fr8.hn,1648300030.cds236.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30638
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/
21 KB
8 KB
Script
General
Full URL
https://cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/popper.min.js
Requested by
Host: security-attempted-transfer.com
URL: http://security-attempted-transfer.com/onlinebanking/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:5914 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c776195ad46333c6c9a9fe3c74502ffea9a02faf122388ea3567922cc65a3060
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://security-attempted-transfer.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36

Response headers

date
Sat, 26 Mar 2022 13:07:10 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
age
445520
x-jsd-version
1.16.0
x-cache
HIT
cross-origin-resource-policy
cross-origin
strict-transport-security
max-age=31536000; includeSubDomains; preload
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
x-served-by
cache-fra19177-FRA
timing-allow-origin
*
x-jsd-version-type
version
server
cloudflare
etag
W/"5309-YvI45zNIx3656GVCan0bfeI8uy0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
access-control-expose-headers
*
cache-control
public, max-age=31536000, s-maxage=31536000, immutable
cf-ray
6f201b947c420225-ZRH
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/
59 KB
16 KB
Script
General
Full URL
https://stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/bootstrap.min.js
Requested by
Host: security-attempted-transfer.com
URL: http://security-attempted-transfer.com/onlinebanking/admin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6812:acf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5aa53525abc5c5200c70b3f6588388f86076cd699284c23cda64e92c372a1548
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://security-attempted-transfer.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36

Response headers

date
Sat, 26 Mar 2022 13:07:10 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
cdn-edgestorageid
601, 617, 617
age
28801335
cdn-cachedat
2021-04-27 06:38:48
cdn-pullzone
252412
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
timing-allow-origin
*
access-control-allow-origin
*
last-modified
Mon, 25 Jan 2021 22:04:09 GMT
server
cloudflare
cdn-requestpullcode
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
application/javascript; charset=utf-8
cdn-cache
HIT
vary
Accept-Encoding
cache-control
public, max-age=31919000
cdn-uid
b1941f61-b576-4f40-80de-5677acb38f74
cdn-requestid
fdb5948a1a1db272b4782e726b48837d
cf-ray
6f201b948fb701db-ZRH
cdn-requestcountrycode
CH
cdn-requestpullsuccess
True
admin.svg
security-attempted-transfer.com/onlinebanking/admin/files/img/
2 KB
2 KB
Image
General
Full URL
http://security-attempted-transfer.com/onlinebanking/admin/files/img/admin.svg
Requested by
Host: security-attempted-transfer.com
URL: http://security-attempted-transfer.com/onlinebanking/admin/
Protocol
HTTP/1.1
Server
95.213.216.168 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
mta.bostonmassachusettssite.com.de
Software
Apache /
Resource Hash
257e399a86659ece27e88738715603f46ca65b1affd7175715bb56b327431055

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://security-attempted-transfer.com/onlinebanking/admin/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/99.0.4844.51 Safari/537.36

Response headers

Date
Sat, 26 Mar 2022 13:07:10 GMT
Last-Modified
Thu, 05 Mar 2020 18:33:02 GMT
Server
Apache
Connection
close
Accept-Ranges
bytes
Content-Length
1920
Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Phishkit Admin (Online)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone object| oncontextlost object| oncontextrestored function| $ function| jQuery function| Popper object| bootstrap

1 Cookies

Domain/Path Name / Value
security-attempted-transfer.com/ Name: PHPSESSID
Value: c2980e8dcdb0faceef529ccec6a29fd5