46.163.76.40
Open in
urlscan Pro
46.163.76.40
Malicious Activity!
Public Scan
Effective URL: http://46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/login.php
Submission: On October 20 via automatic, source openphish
Summary
This is the only time 46.163.76.40 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank Hapoalim (Banking) Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 7 | 46.163.76.40 46.163.76.40 | 8972 (GD-EMEA-D...) (GD-EMEA-DC-SXB1) | |
1 | 2606:4700:303... 2606:4700:3038::6815:ebcb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:4f6b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE) | |
10 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
gstatic.com
fonts.gstatic.com |
14 KB |
1 |
googleapis.com
fonts.googleapis.com |
584 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
17 KB |
1 |
jqueryscript.net
www.jqueryscript.net |
1 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
cdnjs.cloudflare.com
|
1 | cdnjs.cloudflare.com |
46.163.76.40
|
1 | www.jqueryscript.net |
46.163.76.40
|
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-11 - 2021-08-11 |
a year | crt.sh |
cdnjs.cloudflare.com DigiCert ECC Secure Server CA |
2020-08-12 - 2022-08-17 |
2 years | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-09-22 - 2020-12-15 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-09-22 - 2020-12-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/login.php
Frame ID: C3759AF5550D890EBE43589795430E43
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://46.163.76.40/language/de-DE/de/confing/slakt/apo/
HTTP 302
http://46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/login.php Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://46.163.76.40/language/de-DE/de/confing/slakt/apo/
HTTP 302
http://46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log.css
46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/img/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquerysctipttop.css
www.jqueryscript.net/css/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdnjs.cloudflare.com/ajax/libs/bootswatch/4.1.1/flatly/ |
157 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
topw1.png
46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
topw2.png
46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
backlog.png
46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/img/ |
442 KB 442 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
inf.png
46.163.76.40/language/de-DE/de/confing/slakt/apo/4d2d2942244bdf5f2775009768e22f60/img/ |
525 B 819 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 584 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
S6uyw4BMUTPHjx4wXiWtFCc.woff2
fonts.gstatic.com/s/lato/v17/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank Hapoalim (Banking) Facebook (Social Network)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
www.jqueryscript.net
2606:4700:3038::6815:ebcb
2606:4700::6811:4f6b
2a00:1450:4001:802::200a
2a00:1450:4001:808::2003
46.163.76.40
02aeda04fa99c2250cd9f1dc86545a543ed116c101b68f8aefb7ef4441a39c75
036d841b132c14046e26d8f2da1bc634c6ad34885ed1295660694a91c98933a6
0feba34aeeca2fb1ac634e298a86f5a4cec4dd486d6e06a0f55a2b3e52d10d3e
20e37769505894e6b4286c8944ae94a66f7cd368ca813982a76b898ba4f90390
446bc5f68a20a74b22ad5f20563b64542579d7aac2bcd5f6f0f92dde330ba5da
4932506804072609f0a97c6046229408fbcff4dea64b17d6da4fa50d36d2204a
5c16f1a4adf27c77ec93a724e22dac315047acbd3072226a5100160f8e72e4dc
8acd2296a994bdd6b072da00a101df71a56eac085b706bc8525337b87c0744af
9f4a3f2bbc809c0abe3d583b12e5195cf6a032668dc6904bc0f85d10f9c0c9c6
d61bd69a3b53a3ded30c3d480416f8e62b5bd1b5292a006910a150f86928cc18