![](/screenshots/d351b67b-bbc4-48ac-a576-f6abf2f734fb.png)
www.vodafone-nl.net
Open in
urlscan Pro
47.88.220.17
Malicious Activity!
Public Scan
Effective URL: https://www.vodafone-nl.net/voorkom-blokkade/z7E22FOTE9kZCyZ7Su7NhSMKHpbHbPjKWYNZDCThLdgoLgvEKD
Submission: On January 17 via manual from GB
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on January 14th 2019. Valid for: 3 months.
This is the only time www.vodafone-nl.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Vodafone (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 17 | 47.88.220.17 47.88.220.17 | 45102 (CNNIC-ALI...) (CNNIC-ALIBABA-CN-NET-AP Alibaba (China) Technology Co.) | |
1 | 93.184.221.106 93.184.221.106 | 15133 (EDGECAST) (EDGECAST - MCI Communications Services) | |
1 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
15 | 5 |
ASN45102 (CNNIC-ALIBABA-CN-NET-AP Alibaba (China) Technology Co., Ltd., CN)
www.vodafone-nl.net |
ASN15133 (EDGECAST - MCI Communications Services, Inc. d/b/a Verizon Business, US)
cdn.nanigans.com |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
stackpath.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
vodafone-nl.net
5 redirects
www.vodafone-nl.net |
89 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
7 KB |
1 |
nanigans.com
cdn.nanigans.com |
2 KB |
15 | 4 |
Domain | Requested by | |
---|---|---|
17 | www.vodafone-nl.net |
5 redirects
www.vodafone-nl.net
|
1 | ajax.googleapis.com |
www.vodafone-nl.net
|
1 | stackpath.bootstrapcdn.com |
www.vodafone-nl.net
|
1 | cdn.nanigans.com |
www.vodafone-nl.net
|
15 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vodafone-nl.net cPanel, Inc. Certification Authority |
2019-01-14 - 2019-04-14 |
3 months | crt.sh |
*.nanigans.com Go Daddy Secure Certificate Authority - G2 |
2017-03-29 - 2019-04-29 |
2 years | crt.sh |
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2018-12-19 - 2019-03-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.vodafone-nl.net/voorkom-blokkade/z7E22FOTE9kZCyZ7Su7NhSMKHpbHbPjKWYNZDCThLdgoLgvEKD
Frame ID: 26834100D81CA6C64A8C9AD6AFE0E748
Requests: 16 HTTP requests in this frame
Screenshot
![](/screenshots/d351b67b-bbc4-48ac-a576-f6abf2f734fb.png)
Page URL History Show full URLs
-
https://www.vodafone-nl.net/voorkom-blokkade/
HTTP 302
https://www.vodafone-nl.net/voorkom-blokkade/z7E22FOTE9kZCyZ7Su7NhSMKHpbHbPjKWYNZDCThLdgoLgvEKD Page URL
Detected technologies
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.vodafone-nl.net/voorkom-blokkade/
HTTP 302
https://www.vodafone-nl.net/voorkom-blokkade/z7E22FOTE9kZCyZ7Su7NhSMKHpbHbPjKWYNZDCThLdgoLgvEKD Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 11- https://www.vodafone-nl.net/voorkom-blokkade/vodafonerg-webfont.d104cb8434dce92360a9.woff2 HTTP 302
- https://www.vodafone-nl.net/voorkom-blokkade/YXTDQybcUMt4dfGRMwWM5goOzFSI7Es5ClIsUUFOG9TUoAMb6J
- https://www.vodafone-nl.net/voorkom-blokkade/vodafonergbd-webfont.0a19e411a643b1d8be18.woff2 HTTP 302
- https://www.vodafone-nl.net/voorkom-blokkade/f3s5BffUNZxCjYShY3F4aPMVHHuYQSg6WIbxXrrKqZmKXf1ViH
- https://www.vodafone-nl.net/voorkom-blokkade/vodafonerg-webfont.fe9efcb28e1bc6ecb68f.woff HTTP 302
- https://www.vodafone-nl.net/voorkom-blokkade/cICSZLpIXRyfWuDfZzpyNdHbm6VfxgcJZOBYA1HyTfNPKq5J0u
- https://www.vodafone-nl.net/voorkom-blokkade/vodafonergbd-webfont.8a60dc2e7fd783740d1d.woff HTTP 302
- https://www.vodafone-nl.net/voorkom-blokkade/yd2PDX50376xHON8BOr718NfQQs7sWd19fQNdWOg3UNLIBUjpm
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
z7E22FOTE9kZCyZ7Su7NhSMKHpbHbPjKWYNZDCThLdgoLgvEKD
www.vodafone-nl.net/voorkom-blokkade/ Redirect Chain
|
89 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.vodafone-nl.net/voorkom-blokkade/ |
53 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NaN_tracker.js
cdn.nanigans.com/ |
3 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile-new-css.css
www.vodafone-nl.net/voorkom-blokkade/css/ |
1 KB 702 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
qr-icon.svg
www.vodafone-nl.net/voorkom-blokkade/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
www.vodafone-nl.net/voorkom-blokkade/dist/ |
23 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
messages_nl.js
www.vodafone-nl.net/voorkom-blokkade/dist/localization/ |
2 KB 972 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
inloggen.js
www.vodafone-nl.net/voorkom-blokkade/dist/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error.js
www.vodafone-nl.net/voorkom-blokkade/dist/ |
342 B 489 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
YXTDQybcUMt4dfGRMwWM5goOzFSI7Es5ClIsUUFOG9TUoAMb6J
www.vodafone-nl.net/voorkom-blokkade/ Redirect Chain
|
89 KB 13 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f3s5BffUNZxCjYShY3F4aPMVHHuYQSg6WIbxXrrKqZmKXf1ViH
www.vodafone-nl.net/voorkom-blokkade/ Redirect Chain
|
89 KB 13 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cICSZLpIXRyfWuDfZzpyNdHbm6VfxgcJZOBYA1HyTfNPKq5J0u
www.vodafone-nl.net/voorkom-blokkade/ Redirect Chain
|
89 KB 13 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yd2PDX50376xHON8BOr718NfQQs7sWd19fQNdWOg3UNLIBUjpm
www.vodafone-nl.net/voorkom-blokkade/ Redirect Chain
|
89 KB 13 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Vodafone (Telecommunication)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| NaN_api function| $ function| jQuery function| getUrlVars0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.nanigans.com
stackpath.bootstrapcdn.com
www.vodafone-nl.net
209.197.3.15
2a00:1450:4001:809::200a
47.88.220.17
93.184.221.106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