www.updatezionsuser.duckdns.org
Open in
urlscan Pro
212.193.29.43
Malicious Activity!
Public Scan
Effective URL: https://www.updatezionsuser.duckdns.org/login?sslchannel=true&sessionid=2GIbjwUJeddgYz300pJAIf0x5IU8xbOt7cUzkrDDsZ9YhRqzdOFUGKGUt2DIpj2h...
Submission: On August 05 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 5th 2022. Valid for: 3 months.
This is the only time www.updatezionsuser.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Zions Bancorporation (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 212.193.29.43 212.193.29.43 | 399471 (AS-SERVERION) (AS-SERVERION) | |
9 | 1 |
ASN399471 (AS-SERVERION, US)
PTR: buy-service.xyz
www.updatezionsuser.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
duckdns.org
1 redirects
www.updatezionsuser.duckdns.org |
464 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.updatezionsuser.duckdns.org |
1 redirects
www.updatezionsuser.duckdns.org
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
updatezionsuser.duckdns.org R3 |
2022-08-05 - 2022-11-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.updatezionsuser.duckdns.org/login?sslchannel=true&sessionid=2GIbjwUJeddgYz300pJAIf0x5IU8xbOt7cUzkrDDsZ9YhRqzdOFUGKGUt2DIpj2hrTlAk5YHOInWGWNFPsTxcNoYxE7KELMTj7VBjinpQN8snOdHbbpej6u9THrjEHczaI
Frame ID: F747E0EB588A32BC3783E0B519F1AE31
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Login to your Zions Bank Online Banking AccountPage URL History Show full URLs
-
https://www.updatezionsuser.duckdns.org/
HTTP 302
https://www.updatezionsuser.duckdns.org/login?sslchannel=true&sessionid=2GIbjwUJeddgYz300pJAIf0x5IU8xbOt7cUzkrDDsZ9Y... Page URL
Detected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- <div class="[^"]*parbase
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.updatezionsuser.duckdns.org/
HTTP 302
https://www.updatezionsuser.duckdns.org/login?sslchannel=true&sessionid=2GIbjwUJeddgYz300pJAIf0x5IU8xbOt7cUzkrDDsZ9YhRqzdOFUGKGUt2DIpj2hrTlAk5YHOInWGWNFPsTxcNoYxE7KELMTj7VBjinpQN8snOdHbbpej6u9THrjEHczaI Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
www.updatezionsuser.duckdns.org/ Redirect Chain
|
10 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base.css
www.updatezionsuser.duckdns.org/znu_assetz/css/ |
63 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_zionsbank_white.svg
www.updatezionsuser.duckdns.org/znu_assetz/img/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-ehl-footer.png
www.updatezionsuser.duckdns.org/znu_assetz/img/ |
509 B 677 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
www.updatezionsuser.duckdns.org/znu_assetz/js/ |
266 KB 72 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arches-sunset.jpg
www.updatezionsuser.duckdns.org/znu_assetz/img/ |
204 KB 205 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-regular.woff2
www.updatezionsuser.duckdns.org/znu_assetz/fonts/ |
50 KB 50 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
open-sans-semibold.woff2
www.updatezionsuser.duckdns.org/znu_assetz/fonts/ |
52 KB 52 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
www.updatezionsuser.duckdns.org/znu_assetz/fonts/ |
70 KB 70 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Zions Bancorporation (Banking)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.updatezionsuser.duckdns.org/ | Name: PHPSESSID Value: irm4ngsv49ar34rijtdkncgr2u |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.updatezionsuser.duckdns.org
212.193.29.43
03ae651e5c255eac958d80d9e2ec7f35f047dee1fb936228a67fa2942903ade8
041adc19e9856d1d74105199d700bf46a7b213fc83a677969ebd41f4d83a5217
7dacf83f51179de8d7980a513e67ab3a08f2c6272bb5946df8fd77c0d1763b73
838f986da828b6271c66b0784a5b5e56b495e8c7598918ddfecc397ef6c80456
84086bb634fc6fd223918894c6b74641811e06e84007937c5809942b7a02ddff
be3a8f0fac6b9260176b4739a944d94c1203e376cbc495c71341bd90b1022c7f
be920c90495b0950f20748f11828a60addfe4f2af16d01c825cf5d67578389fb
e86cfeb2d71ea214fe4ade51d9aa7e6c04f806f78a99ff337c1d3782e8c5ad45
ee605529eb6df967126409b08933a5a5cb0966fe4686d3b7c72cf7ef682cfd85