ubrprufen-23.in Open in urlscan Pro
2606:4700:3031::6815:5fd0  Malicious Activity! Public Scan

Submitted URL: http://ubrprufen-volks.online/
Effective URL: https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=40122&feeder=0347261b2c...
Submission: On March 29 via manual from DE — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3031::6815:5fd0, located in United States and belongs to CLOUDFLARENET, US. The main domain is ubrprufen-23.in.
TLS certificate: Issued by GTS CA 1P5 on March 11th 2023. Valid for: 3 months.
This is the only time ubrprufen-23.in was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Volksbank (Banking)

Domain & IP information

IP Address AS Autonomous System
2 2 2606:4700:303... 13335 (CLOUDFLAR...)
3 4 2606:4700:303... 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
4 ubrprufen-23.in
ubrprufen-23.in
17 KB
2 ubrprufen-volks.online
ubrprufen-volks.online
1 KB
1 2
Domain Requested by
4 ubrprufen-23.in 3 redirects
2 ubrprufen-volks.online 2 redirects
1 2

This site contains links to these domains. Also see Links.

Domain
index.html
Subject Issuer Validity Valid
*.ubrprufen-23.in
GTS CA 1P5
2023-03-11 -
2023-06-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=40122&feeder=0347261b2c72607648aaa9180b110eb75f1145e8
Frame ID: 45B976FCB544A89217041611994B9B45
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Volksbank

Page URL History Show full URLs

  1. http://ubrprufen-volks.online/ HTTP 301
    https://ubrprufen-volks.online/ HTTP 302
    https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv HTTP 301
    http://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 301
    https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 302
    https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=401... Page URL

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

15 kB
Transfer

47 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ubrprufen-volks.online/ HTTP 301
    https://ubrprufen-volks.online/ HTTP 302
    https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv HTTP 301
    http://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 301
    https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/ HTTP 302
    https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=40122&feeder=0347261b2c72607648aaa9180b110eb75f1145e8 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/
Redirect Chain
  • http://ubrprufen-volks.online/
  • https://ubrprufen-volks.online/
  • https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv
  • http://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/
  • https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/Cl!35jf!jrjvfv/
  • https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=40122&feeder=0347261b2c72607648aaa9180b110eb75f1145e8
32 KB
15 KB
Document
General
Full URL
https://ubrprufen-23.in/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=40122&feeder=0347261b2c72607648aaa9180b110eb75f1145e8
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3031::6815:5fd0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5e143f46fbe60b667d70121b9398e6c68d0d38b0dee35c1ffe1f825e61fb2b5b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
7af85a5f1ef09bfa-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Wed, 29 Mar 2023 13:10:27 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=%2BOZEbnzlHH9hp%2FpLfs1Mkzq1%2BXZWZcfHhfXiJHHxScOsuMm%2FjYBqFv%2F0m9hNKseXfKVerL2KKHC%2FHnpezMx90eiaXNqmRXstZV1%2Bp%2FEPF6lmQeU5T1Bg4YnVE28BUGOfed6J0MGBhs18JX9ToZ0%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding

Redirect headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
7af85a56cb4439d6-FRA
content-type
text/html; charset=UTF-8
date
Wed, 29 Mar 2023 13:10:26 GMT
location
/De/H81921MSfw43849!6472378/T71898MS!hahsDhwj1JJT/P8719823!nfvmjkf/?index=40122&feeder=0347261b2c72607648aaa9180b110eb75f1145e8
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=UjuTZnMrgRNVOUJ6qaPj9G6ZwyjubZcl%2Fs4wIV1gcRe89i%2FUtBqP35%2FOflgwzdNpZVNU6Qd%2Fb4jiuFdqX8hk%2BZBmhtf6fsAKSOsvD9DeCXAqXxjRmxIxU4VD2D3tBI8oA03IzAkOgYzPQbhp9v8%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c326ddecf044055b08877e3b3c9e9fbf8ce50c35fe4ea69bc4b07bb649d167e5

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
03ad79bb26c2e3de4b0d10af45d4d53ddae4bb47a18ec7a0925f2423e867e568

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fe2f346c178847f29c9d4fc6b13316ab928541f4418d5848f7ee7505d2d463fa

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
da9bb884679e20a2f8097e37e5c4e62f606176c6fd69032bc02f43aeba844581

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
971 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
18efdfb68de64e0aea1ed781c93aeaa990c22a7d1882236103c00a4a317df54e

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.146 Safari/537.36

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Volksbank (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| savepage_ShadowLoader

0 Cookies