vr-posteingang.in Open in urlscan Pro
2606:4700:3035::ac43:d0fe  Malicious Activity! Public Scan

Submitted URL: https://vr-posteingang.online/
Effective URL: https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=61341&feeder=f5f0cc57dd...
Submission: On April 15 via automatic, source certstream-suspicious — Scanned from NL

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3035::ac43:d0fe, located in United States and belongs to CLOUDFLARENET, US. The main domain is vr-posteingang.in.
TLS certificate: Issued by GTS CA 1P5 on April 15th 2023. Valid for: 3 months.
This is the only time vr-posteingang.in was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Volksbank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 2a06:98c1:312... 13335 (CLOUDFLAR...)
2 3 2606:4700:303... 13335 (CLOUDFLAR...)
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
4 vr-posteingang.in
vr-posteingang.in
17 KB
1 vr-posteingang.online
vr-posteingang.online
517 B
1 2
Domain Requested by
4 vr-posteingang.in 3 redirects
1 vr-posteingang.online 1 redirects
1 2

This site contains links to these domains. Also see Links.

Domain
index.html
Subject Issuer Validity Valid
vr-posteingang.in
GTS CA 1P5
2023-04-15 -
2023-07-14
3 months crt.sh

This page contains 1 frames:

Primary Page: https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=61341&feeder=f5f0cc57ddebb9271d05eea0928daa9b61e6548c
Frame ID: E5216F70B4F98D59389792D1D45B1F96
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Volksbank

Page URL History Show full URLs

  1. https://vr-posteingang.online/ HTTP 302
    https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv HTTP 301
    http://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 301
    https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 302
    https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=613... Page URL

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

15 kB
Transfer

47 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://vr-posteingang.online/ HTTP 302
    https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv HTTP 301
    http://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 301
    https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 302
    https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=61341&feeder=f5f0cc57ddebb9271d05eea0928daa9b61e6548c Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/
Redirect Chain
  • https://vr-posteingang.online/
  • https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv
  • http://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/
  • https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/
  • https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=61341&feeder=f5f0cc57ddebb9271d05eea0928daa9b61e6548c
32 KB
15 KB
Document
General
Full URL
https://vr-posteingang.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=61341&feeder=f5f0cc57ddebb9271d05eea0928daa9b61e6548c
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3035::ac43:d0fe , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5e143f46fbe60b667d70121b9398e6c68d0d38b0dee35c1ffe1f825e61fb2b5b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36
accept-language
nl-NL,nl;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
7b81f8c67a1b0c79-AMS
content-encoding
br
content-type
text/html; charset=UTF-8
date
Sat, 15 Apr 2023 06:01:04 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Zb6byo4vekYTIWbZctJr77hqhMgnf%2F1fTOQhBroZKyVZxqpdBTmHW6DDSBjIbeo3p%2BokrSOSyRD4CQ5Nlz4Q6d7K3mTBvnM%2FSSvtQ1mXW0Uf5YDoWYV1%2FfvIz3WerW4jhL9JId82tcClYaIwV0roUg%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding

Redirect headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
7b81f8c2497c1c93-AMS
content-type
text/html; charset=UTF-8
date
Sat, 15 Apr 2023 06:01:03 GMT
location
/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=61341&feeder=f5f0cc57ddebb9271d05eea0928daa9b61e6548c
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=8akBXjejZqwZqFYGf1ZNWpiha3hVkSWNtrNnahoO%2BsLSCdGC7Sd9xthiLnGGyKVoNycKnYzFSnemVpJVeyg0RbUPJSovLRkWdPDL%2FXhIlo7KAAMPmm1nyfmcvD%2Fgi8rJfA3VXIIYRdeMTyp8SZJ8rA%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c326ddecf044055b08877e3b3c9e9fbf8ce50c35fe4ea69bc4b07bb649d167e5

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
03ad79bb26c2e3de4b0d10af45d4d53ddae4bb47a18ec7a0925f2423e867e568

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fe2f346c178847f29c9d4fc6b13316ab928541f4418d5848f7ee7505d2d463fa

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
da9bb884679e20a2f8097e37e5c4e62f606176c6fd69032bc02f43aeba844581

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
971 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
18efdfb68de64e0aea1ed781c93aeaa990c22a7d1882236103c00a4a317df54e

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.49 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Volksbank (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| savepage_ShadowLoader

0 Cookies