Security Scan Report: sansign-login.app

Redirected to: https://meine.santander.de/login/#/login/

Submitted: Mar 18, 2026, 6:03:51 AMCompleted: Mar 18, 2026, 6:05:03 AMpubliccompleted
Loading additional data...

Summary

This website contacted 8 IPs in 1 country across 10 domains to perform 1 HTTP transaction. The main domain is meine.santander.de.

Submitted URL: https://sansign-login.app/

Effective URL: https://meine.santander.de/login/#/login/Redirected

AI Security Verdict

Confirmed Scam

Confidence: 95%

10
Risk Score

Phishing page impersonating Santander, new domain, harvests passwords – confirmed scam.

Risk Factors
Critical new domain (<7 days old)
Brand impersonation of Santander on unranked domain
Password‑only field (credential harvesting pattern)
Cross‑origin credential submission to official Santander site
High‑severity IDS alert indicating phishing
Domain age information unavailable

Details

Bot Protection Detected

This website is protected by imperva bot protection. Our scanner was challenged or blocked during access.

Page Title

Login MySantander

Scan Type

public

Language

🇩🇪

German

(80% confidence)

Category

finance banking

(59%)

Domain Information

You're looking at domain 'sansign-login.app' on the application-focused generic top-level domain (.app). Its registrable label 'sansign-login' stretches across 13 characters split between four vowels and eight consonants, notching one hyphen. Splitting it apart reveals three words: san, sign, login. The median word length lands at four characters. No strong language cues emerged from the frequency lists.

Screenshot

Security scan screenshot of https://sansign-login.app/

Page Load Overview

1.94s
Total Load Time
114
HTTP Requests
14
Domains
1.0 MB
Total Size

Language Analysis

Primary Language

🇩🇪German
Code: de
Confidence:80%
Script:Latin
Direction:ltr

Detection Details

Language Code:de
Detection Confidence:80%
Script Type:Latin
HTML Lang Attribute:de
Text Length:618 chars
Detector Agreement:50%

Website Classification

Primary Category

finance banking59% confidence
Type: static
Method: ml+structural

All Detected Categories

finance banking
59%

Detected Features

No structural features detected

Domain & IP Information

RequestsIP AddressLocationAS Autonomous System
16172.67.184.16United States
1435.241.3.184Kansas City, Missouri, United States
AS396982Google LLC
1445.60.197.69United States
AS19551Incapsula Inc
1435.190.14.188United States
AS396982Google LLC
1491.235.133.67United States
AS30286ThreatMetrix Inc.
1491.235.134.131United States
AS30286ThreatMetrix Inc.
14192.0.78.27United StatesUnknown
1491.235.132.130United States
AS30286ThreatMetrix Inc.
1148--

Detected Technologies3

Content Similarity HashesFor malware variant detection

TLSH (Trend Micro Locality Sensitive Hash)

Security-focused

Specialized for malware detection and similarity analysis

T11FB5B4F7681D773FE165151D21CF93172161AECBBE2010888C59EB89CF73D8A2AE246D

ssdeep (Context Triggered Piecewise Hashing)

Context-aware

Detects similar content even with modifications

12288:T3aUDcHZcaA+glJjlSvWGMGFAv8UExck0fze/VDBqv6mc7rH66H6Rhp00Rx5K3OJ:j

sdhash (Similarity Digest Hashing)

High-precision

High-precision similarity detection for forensic analysis

sdhash:3:2334070:A4rIQBIQgYhAQESuUSSAhwQRCDLpwgAjpBAgoluCxlQwQgIzOqwojYKFLqoYWtqQEirIwkbooEeUmUEgIgoAg4SJdCJIBAsB

These hashes enable detection of similar websites and malware variants by comparing content similarity even when exact matches aren't found.

Image Hashes

Perceptual Hashes

Average Hash:3e9fffd383dfdf83
Perceptual Hash:bcc7833c2cc3c33c
Difference Hash:c030323636343a2e
Wavelet Hash:009edef2829fdf80
Color Hash:#63ac53

Other Hashes

Crop Resistant:c030323636343a2e

Scan History

Scan history not available

Unable to load historical scan data