tuttiprezzi.net
Open in
urlscan Pro
82.165.76.60
Malicious Activity!
Public Scan
Effective URL: https://tuttiprezzi.net/wordpress/telekom/new/index.html?email=
Submission: On October 08 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 19th 2020. Valid for: 3 months.
This is the only time tuttiprezzi.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telekom (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 103.15.243.74 103.15.243.74 | 131735 (IDNIC-TNC...) (IDNIC-TNC-ID PT Telemedia Network Cakrawala) | |
1 | 82.165.76.60 82.165.76.60 | 8560 (ONEANDONE...) (ONEANDONE-AS Brauerstrasse 48) | |
12 | 2003:2:2:140:... 2003:2:2:140:62:157:140:200 | 3320 (DTAG Inte...) (DTAG Internet service provider operations) | |
1 | 80.158.67.40 80.158.67.40 | 34086 (SCZN-AS) (SCZN-AS) | |
14 | 3 |
ASN131735 (IDNIC-TNC-ID PT Telemedia Network Cakrawala, ID)
PTR: ip-74-243.diskominfo.madina.go.id
dlh.madina.go.id |
ASN3320 (DTAG Internet service provider operations, DE)
accounts.login.idm.telekom.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
telekom.com
accounts.login.idm.telekom.com |
275 KB |
1 |
telekom.de
www.telekom.de |
|
1 |
tuttiprezzi.net
tuttiprezzi.net |
9 KB |
1 |
madina.go.id
1 redirects
dlh.madina.go.id |
333 B |
14 | 4 |
Domain | Requested by | |
---|---|---|
12 | accounts.login.idm.telekom.com |
tuttiprezzi.net
accounts.login.idm.telekom.com |
1 | www.telekom.de |
tuttiprezzi.net
|
1 | tuttiprezzi.net | |
1 | dlh.madina.go.id | 1 redirects |
14 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
meinkonto.telekom-dienste.de |
www.telekom.de |
www.telekom.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
tuttiprezzi.net Let's Encrypt Authority X3 |
2020-09-19 - 2020-12-18 |
3 months | crt.sh |
accounts.login.idm.telekom.com TeleSec ServerPass Extended Validation Class 3 CA |
2018-11-06 - 2020-11-11 |
2 years | crt.sh |
www.telekom.de TeleSec ServerPass Class 2 CA |
2020-08-11 - 2022-08-16 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://tuttiprezzi.net/wordpress/telekom/new/index.html?email=
Frame ID: 58E5699FD9E5FF10A37EC4880AD79013
Requests: 13 HTTP requests in this frame
Frame:
https://www.telekom.de/resources/tbs-config/phoenix_login_tracking?page=login&mode=web&context=auth&status=first_attempt
Frame ID: CA89A8A83084C257C1331DB01E3B8CB4
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://dlh.madina.go.id/wp-includes/server/index.php
HTTP 302
https://tuttiprezzi.net/wordpress/telekom/new/index.html?email= Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Benutzername oder Passwort vergessen?
Search URL Search Domain Scan URL
Title: Brauchen Sie Hilfe?
Search URL Search Domain Scan URL
Title: Jetzt für Telekom.de registrieren
Search URL Search Domain Scan URL
Title: Impressum
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://dlh.madina.go.id/wp-includes/server/index.php
HTTP 302
https://tuttiprezzi.net/wordpress/telekom/new/index.html?email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
tuttiprezzi.net/wordpress/telekom/new/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.min.css
accounts.login.idm.telekom.com/static/vdplus/css/ |
85 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
accounts.login.idm.telekom.com/static/factorx/vdplus/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
services.png
accounts.login.idm.telekom.com/static/factorx/vdplus/images/ |
22 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
accounts.login.idm.telekom.com/static/vdplus/js/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
components.min.js
accounts.login.idm.telekom.com/static/vdplus/js/ |
66 KB 21 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
accounts.login.idm.telekom.com/static/factorx/vdplus/js/ |
13 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
data_protection.svg
accounts.login.idm.telekom.com/static/factorx/vdplus/images/ |
713 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telekomicon-outline.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
9 KB 9 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-bold.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
53 KB 53 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-thin.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
57 KB 58 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telegroteskscreen-regular.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
54 KB 54 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phoenix_login_tracking
www.telekom.de/resources/tbs-config/ Frame CA89 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telekomicon-ui.woff
accounts.login.idm.telekom.com/static/vdplus/fonts/ |
3 KB 3 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telekom (Telecommunication)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| accountLocked boolean| accountLockedPermanent number| accountLockExpiration function| $ function| jQuery object| Login0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
accounts.login.idm.telekom.com
dlh.madina.go.id
tuttiprezzi.net
www.telekom.de
103.15.243.74
2003:2:2:140:62:157:140:200
80.158.67.40
82.165.76.60
14977cb7057352ad7715b93dec52f4993fc16980836d03b64f79566e8c9bec22
21d4dc49ec496581969051f9f542afee01f9029e7db6112bff99e7be2942de53
345466d497966801ab4b5390c09e49d03f2ede8539bd35a56e25ed15bb2dc80e
43493c8fdfe7935a395920ef619a4dc56c440479ce190ad2ac1df8e23acc5595
499ba34b8e05f9009a96552c116d4bc5c57b6f5e5060a514dd8978c6147cefd0
4f45d9883e3e19f7eaf72e99e614335bf13d68446a9a09a6cd777940ad9597da
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
870c62606d520eb179f4bfe0edc1258a454811c692487cdb3ed9838582c5a22f
8cdd18e870fddcc944d55829b4fd7181845a7dd76163fd8a609bcc581fba53a3
d9e120fd2798b90e1a4aed8b465d891de4ee81ee43cfc6a417ad2015bd3c6be3
e185aceb03040c947c211bc9e972ce427f11c5801338fd8f943e3b53e229eb3e
e1b1f6b64573c86c3b9f5f023ab7e791a074dbccb87d61e886cb6fa659ba9485
e5a1bef74748388cadf99777549feff118627b888816a6f57fc0fb36e3cad57f