tekuon.com
Open in
urlscan Pro
188.165.129.145
Malicious Activity!
Public Scan
Submission: On September 04 via api from QA
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on August 3rd 2020. Valid for: 3 months.
This is the only time tekuon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BankID (Banking) Eika Gruppen (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 188.165.129.145 188.165.129.145 | 16276 (OVH) (OVH) | |
5 | 62.92.136.17 62.92.136.17 | 2119 (TELENOR-N...) (TELENOR-NEXTEL Telenor Norge AS) | |
3 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 62.92.136.21 62.92.136.21 | 2119 (TELENOR-N...) (TELENOR-NEXTEL Telenor Norge AS) | |
21 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
portalbank.no
id.portalbank.no www2.portalbank.no |
887 KB |
3 |
bootstrapcdn.com
netdna.bootstrapcdn.com |
67 KB |
3 |
tekuon.com
1 redirects
tekuon.com |
3 KB |
21 | 3 |
Domain | Requested by | |
---|---|---|
5 | id.portalbank.no |
tekuon.com
id.portalbank.no |
3 | netdna.bootstrapcdn.com |
tekuon.com
netdna.bootstrapcdn.com |
3 | tekuon.com | 1 redirects |
1 | www2.portalbank.no |
tekuon.com
|
21 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
eika.no |
www.bankid.no |
Subject Issuer | Validity | Valid | |
---|---|---|---|
backupdevelop.ovh Let's Encrypt Authority X3 |
2020-08-03 - 2020-11-01 |
3 months | crt.sh |
id.portalbank.no Buypass Class 3 CA 2 |
2019-10-29 - 2021-11-09 |
2 years | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
www2.portalbank.no Buypass Class 3 CA 2 |
2019-02-27 - 2021-03-23 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://tekuon.com/js/vendor/portalbamk/
Frame ID: C2D3271CE702D603D83152AB30D3E647
Requests: 21 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
Ionicons (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+ionicons(?:\.min)?\.css/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Avbryt
Search URL Search Domain Scan URL
Title: Bruk og support av BankID og BankID på mobil
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://tekuon.com/js/vendor/portalbamk HTTP 301
- https://tekuon.com/js/vendor/portalbamk/
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
tekuon.com/js/vendor/portalbamk/ Redirect Chain
|
0 357 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
tekuon.com/js/vendor/portalbamk/ |
14 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
eika-green.css
id.portalbank.no/web-kundeid/dist/css/ |
451 KB 98 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ionicons.css
id.portalbank.no/web-kundeid/dist/css/ |
60 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
id.portalbank.no/web-kundeid/dist/css/ |
12 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-combined.no-icons.min.css
netdna.bootstrapcdn.com/twitter-bootstrap/2.3.2/css/ |
116 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
netdna.bootstrapcdn.com/font-awesome/3.2.1/css/ |
27 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
small_logo.jpg
www2.portalbank.no/bankcontent/0770/img/ |
8 KB 9 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brikke.svg
id.portalbank.no/web-kundeid/dist/img/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bundle.js
id.portalbank.no/web-kundeid/dist/js/ |
2 MB 762 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Eika-Medium.woff2
id.portalbank.no/web-kundeid/dist/fonts/Eika/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Roboto-medium.woff2
id.portalbank.no/web-kundeid/dist/fonts/Roboto/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Roboto-regular.woff2
id.portalbank.no/web-kundeid/dist/fonts/Roboto/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Eika-Semibold.woff2
id.portalbank.no/web-kundeid/dist/fonts/Eika/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff
netdna.bootstrapcdn.com/font-awesome/3.2.1/font/ |
43 KB 43 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Eika-Bold.woff2
id.portalbank.no/web-kundeid/dist/fonts/Eika/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Eika-Medium.woff
id.portalbank.no/web-kundeid/dist/fonts/Eika/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Roboto-medium.woff
id.portalbank.no/web-kundeid/dist/fonts/Roboto/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Eika-Bold.woff
id.portalbank.no/web-kundeid/dist/fonts/Eika/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Roboto-regular.woff
id.portalbank.no/web-kundeid/dist/fonts/Roboto/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
Eika-Semibold.woff
id.portalbank.no/web-kundeid/dist/fonts/Eika/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Eika/Eika-Medium.woff2?md5-by-cache-buster=a2d022f9b887f14d7ac35aee1b96a70f
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Roboto/Roboto-medium.woff2?md5-by-cache-buster=1afbee5a09a022fe0287f16e9a48da1f
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Roboto/Roboto-regular.woff2?md5-by-cache-buster=f84cb1bf9be983133497000554605b4d
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Eika/Eika-Semibold.woff2?md5-by-cache-buster=fdb59f69cf702cf23ad8b7b06661c8f7
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Eika/Eika-Bold.woff2?md5-by-cache-buster=f14c712978b1c0b4bef1f6d202e6d3ec
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Eika/Eika-Medium.woff?md5-by-cache-buster=79fe2130cf4ca8e23965a4338a481a06
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Roboto/Roboto-medium.woff?md5-by-cache-buster=0f3b7101a8adc1afe1fbe89775553c32
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Eika/Eika-Bold.woff?md5-by-cache-buster=74d276a434e6ab79b83f20838750405b
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Roboto/Roboto-regular.woff?md5-by-cache-buster=f94d5e5102359961c44a1da1b58d37c9
- Domain
- id.portalbank.no
- URL
- https://id.portalbank.no/web-kundeid/dist/fonts/Eika/Eika-Semibold.woff?md5-by-cache-buster=d5d243be2d4bc4ef821d602f0302ef6c
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BankID (Banking) Eika Gruppen (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| bid20upbw2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
tekuon.com/ | Name: PHPSESSID Value: e19364a61955c0d851077e62bda21eb0 |
|
tekuon.com/js/vendor/portalbamk | Name: visited Value: yes |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
id.portalbank.no
netdna.bootstrapcdn.com
tekuon.com
www2.portalbank.no
id.portalbank.no
188.165.129.145
2001:4de0:ac19::1:b:3b
62.92.136.17
62.92.136.21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