dkb-banking-de.ft.ummetro.ac.id
Open in
urlscan Pro
103.213.116.93
Malicious Activity!
Public Scan
Effective URL: https://dkb-banking-de.ft.ummetro.ac.id/web-index.php?client=TY4QG6HXOC35P8V0SFJUIB7N1LR2EA9MZWKD
Submission: On August 03 via automatic, source phishtank
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 30th 2020. Valid for: 3 months.
This is the only time dkb-banking-de.ft.ummetro.ac.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DKB (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.204.90.22 52.204.90.22 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 2 | 51.38.238.9 51.38.238.9 | 16276 (OVH) (OVH) | |
12 | 103.213.116.93 103.213.116.93 | 38750 (TDS-AS-ID...) (TDS-AS-ID Telemedia Dinamika Sarana) | |
1 | 2606:4700::68... 2606:4700::6810:84e5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a00:1450:400... 2a00:1450:4001:818::2003 | 15169 (GOOGLE) (GOOGLE) | |
18 | 5 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-204-90-22.compute-1.amazonaws.com
urldefense.com |
ASN38750 (TDS-AS-ID Telemedia Dinamika Sarana, PT, ID)
PTR: dc-c58108e728f0.ummetro.ac.id
dkb-banking-de.ft.ummetro.ac.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
ummetro.ac.id
dkb-banking-de.ft.ummetro.ac.id |
1 MB |
3 |
gstatic.com
fonts.gstatic.com |
27 KB |
2 |
purfan.com
1 redirects
www.purfan.com |
809 B |
1 |
googleapis.com
fonts.googleapis.com |
895 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
30 KB |
1 |
urldefense.com
1 redirects
urldefense.com |
574 B |
18 | 6 |
Domain | Requested by | |
---|---|---|
12 | dkb-banking-de.ft.ummetro.ac.id |
www.purfan.com
dkb-banking-de.ft.ummetro.ac.id |
3 | fonts.gstatic.com |
dkb-banking-de.ft.ummetro.ac.id
|
2 | www.purfan.com | 1 redirects |
1 | fonts.googleapis.com |
dkb-banking-de.ft.ummetro.ac.id
|
1 | cdnjs.cloudflare.com |
dkb-banking-de.ft.ummetro.ac.id
|
1 | urldefense.com | 1 redirects |
18 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.purfan.com Thawte RSA CA 2018 |
2019-10-01 - 2020-10-30 |
a year | crt.sh |
dkb-banking-de.ft.ummetro.ac.id cPanel, Inc. Certification Authority |
2020-07-30 - 2020-10-28 |
3 months | crt.sh |
cloudflare.com Cloudflare Inc ECC CA-3 |
2020-07-04 - 2021-07-04 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-07-07 - 2020-09-29 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-07-07 - 2020-09-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dkb-banking-de.ft.ummetro.ac.id/web-index.php?client=TY4QG6HXOC35P8V0SFJUIB7N1LR2EA9MZWKD
Frame ID: 61D91ED1FA42360FEDC786013260C27E
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://urldefense.com/v3/__https:/www.purfan.com/link*thomas.walther@zuerich.de*01.08.202011:21*53...
HTTP 302
https://www.purfan.com/link HTTP 301
https://www.purfan.com/link/ Page URL
- https://dkb-banking-de.ft.ummetro.ac.id/?client=EQR02NOLVXU7TMPIC6Z5GHFAYJ1BW4D3S8K9 Page URL
- https://dkb-banking-de.ft.ummetro.ac.id/web-index.php?client=TY4QG6HXOC35P8V0SFJUIB7N1LR2EA9MZWKD Page URL
Detected technologies
Debian (Operating Systems) ExpandDetected patterns
- headers server /Debian/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://urldefense.com/v3/__https:/www.purfan.com/link*thomas.walther@zuerich.de*01.08.202011:21*5310/2020:*20eukjlnxkodxacb:ot:ip7err7tkfgo2u:1/4231524124044351?WwmdXRtX2NhbXBhaWduPXVzX3NwMjBfY29sX3dld192Y2JvYXJkd2Fsa19vZl90cmF2ZWxlciJ9&jw*20tS=1ed974931223aa01fc14dbd0c78c1318*id=AQMkADAwATYwMAItZjYzZS1iMGFkLTAwAi0wMAoARgAAA6T3qYDMlaRPjSMDJtsk0bsHANRCtl*2FSUrhOttcv6Aatz7wAAAIBCgAAANRCtl*2FSUrhOttcv6Aatz7wAAuWGK5UAAAABEgAQAA*2BDyciOcElCtmhnVYPHZJ0*3D__;IysrJSU_JSUlJQ!!FVajH6CFHhmYMuQ!qS3I1kq9F2L8V0tXDH4rH5J0Wj248NvlrtQRGQ1uz5mLYSiLqxZ0tLArGl8790oTNCtVNIk$
HTTP 302
https://www.purfan.com/link HTTP 301
https://www.purfan.com/link/ Page URL
- https://dkb-banking-de.ft.ummetro.ac.id/?client=EQR02NOLVXU7TMPIC6Z5GHFAYJ1BW4D3S8K9 Page URL
- https://dkb-banking-de.ft.ummetro.ac.id/web-index.php?client=TY4QG6HXOC35P8V0SFJUIB7N1LR2EA9MZWKD Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://urldefense.com/v3/__https:/www.purfan.com/link*thomas.walther@zuerich.de*01.08.202011:21*5310/2020:*20eukjlnxkodxacb:ot:ip7err7tkfgo2u:1/4231524124044351?WwmdXRtX2NhbXBhaWduPXVzX3NwMjBfY29sX3dld192Y2JvYXJkd2Fsa19vZl90cmF2ZWxlciJ9&jw*20tS=1ed974931223aa01fc14dbd0c78c1318*id=AQMkADAwATYwMAItZjYzZS1iMGFkLTAwAi0wMAoARgAAA6T3qYDMlaRPjSMDJtsk0bsHANRCtl*2FSUrhOttcv6Aatz7wAAAIBCgAAANRCtl*2FSUrhOttcv6Aatz7wAAuWGK5UAAAABEgAQAA*2BDyciOcElCtmhnVYPHZJ0*3D__;IysrJSU_JSUlJQ!!FVajH6CFHhmYMuQ!qS3I1kq9F2L8V0tXDH4rH5J0Wj248NvlrtQRGQ1uz5mLYSiLqxZ0tLArGl8790oTNCtVNIk$ HTTP 302
- https://www.purfan.com/link HTTP 301
- https://www.purfan.com/link/
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
www.purfan.com/link/ Redirect Chain
|
189 B 544 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
/
dkb-banking-de.ft.ummetro.ac.id/ |
164 B 566 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
web-index.php
dkb-banking-de.ft.ummetro.ac.id/ |
13 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
dkb-banking-de.ft.ummetro.ac.id/assets/css/ |
138 KB 138 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
helpers.css
dkb-banking-de.ft.ummetro.ac.id/assets/css/ |
41 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
dkb-banking-de.ft.ummetro.ac.id/assets/css/ |
8 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
dkb-banking-de.ft.ummetro.ac.id/assets/images/ |
5 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
img2.jpg
dkb-banking-de.ft.ummetro.ac.id/assets/images/ |
22 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo2.jpg
dkb-banking-de.ft.ummetro.ac.id/assets/images/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.4.1/ |
86 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.min.js
dkb-banking-de.ft.ummetro.ac.id/assets/js/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
dkb-banking-de.ft.ummetro.ac.id/assets/js/ |
50 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome.min.js
dkb-banking-de.ft.ummetro.ac.id/assets/js/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
dkb-banking-de.ft.ummetro.ac.id/assets/js/ |
25 B 278 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
10 KB 895 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DKB (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Popper object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dkb-banking-de.ft.ummetro.ac.id/ | Name: PHPSESSID Value: 8p4nv01en8a736pg9csl3bsu14 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
dkb-banking-de.ft.ummetro.ac.id
fonts.googleapis.com
fonts.gstatic.com
urldefense.com
www.purfan.com
103.213.116.93
2606:4700::6810:84e5
2a00:1450:4001:801::200a
2a00:1450:4001:818::2003
51.38.238.9
52.204.90.22
04de149751276069b2c581032afc9c43bf176fe06868a1f2147f3935b8ad116b
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
13f95a901286419f2b3235f55bbbb2de45a7d4c68d845f34ecd999a9d3d50603
21bd54c766f0a1385f24f0b9a074e83881d82288d9d31bab0e3076721121f52e
315ac5479007d2e864a4b51f505fd0785ebbbe931a6b511467fa49504a082c58
3fadfc70661c394dc68865f28bc889aeff26b251c6994cafbecc2300168c09ad
54c64f3c66372027154f01fc9f24b4e25fdfe405b70d1994c79abbc2576ff775
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4
5b64719b2c9f5ab10d2040789185baaeb8e4c4ad7ee34e2654029c68ba397b20
7928b5ab63c6e89ee0ee26f5ef201a58c72baf91abb688580a1aa26eb57b3c11
7eeba671dc7b044d5e861c29d5a19e39b6798846899a56bf99c8bc79242d4dd3
914361675397016c1e0532c900419e1c046a77f24056af340bb56352d5bba522
9cddd6352a3c455a6553ab2c7959827c2f89b1043c4e81e47b7631dcde06cf7f
a48a6e4b14fe55f750c0a3dfb5a6f4941bdc06af0aa542b90de25c30c2b4625c
b8e23a845bc6b7fd417d29182e0e38d353e64b5e12e06bb1de2b5ce063db1dcc
eb47124dc13dfa2da0a673d8080277d55336869876032f187ed189589d0a6371
f839760d1621714efedeb3eb08b25e619812dcc33d77aceb0daf405ac727a765
fef970087c9a065b8552293e498e0232148f79cec8f1188db76fd1b25c6444a3