Attack Breakdown
ID: scan_2025_12_29_h9t2
Homograph / IDN Attack
Cyrillic characters mimicking Latin
alphabet detected.
Homograph / IDN Attack
Cyrillic characters mimicking Latin alphabet detected.
The domain uses the Cyrillic 'а' (U+0430) instead of Latin 'a' (U+0061). This technique is commonly used to trick users into believing they are visiting a legitimate service.
Suspicious Redirect Chain
3 hops detected involving known URL
shorteners.
Suspicious Redirect Chain
3 hops detected involving known URL shorteners.
-
QR Code Scan
http://bit.ly/3x891 -
Intermediate Hop
http://tracker-service-cloud.net/ref?id=99 -
Final Destination
http://xn--secure-bankng-87b.com/login
Obfuscated JavaScript
High entropy string detected in URL parameters.
Obfuscated JavaScript
High entropy string detected in URL parameters.
<script>eval(function(p,a,c,k,e,d){e=function(c){return c};if(!''.replace(/^/,String)...