bpm.shaparak.ir
Open in
urlscan Pro
176.56.157.159
Malicious Activity!
Public Scan
Effective URL: https://bpm.shaparak.ir/pgwchannel/result.mellat?RefId=1B2B96408DB4216E&BLOCKER_ERROR=invalidRefId
Submission Tags: @phish_report
Submission: On October 16 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by Certum Extended Validation CA SHA2 on May 2nd 2023. Valid for: a year.
This is the only time bpm.shaparak.ir was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank Mellat (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 81.12.52.58 81.12.52.58 | 208161 (PARSVDS) (PARSVDS) | |
1 13 | 176.56.157.159 176.56.157.159 | 43415 (SITSCO-AS) (SITSCO-AS) | |
13 | 2 |
ASN208161 (PARSVDS, IR)
PTR: ip-81-12-52-58.hosted-by.parsvds.com
api.dezhakam.lol |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
shaparak.ir
1 redirects
bpm.shaparak.ir — Cisco Umbrella Rank: 295753 |
393 KB |
1 |
dezhakam.lol
api.dezhakam.lol |
677 B |
13 | 2 |
Domain | Requested by | |
---|---|---|
13 | bpm.shaparak.ir |
1 redirects
bpm.shaparak.ir
|
1 | api.dezhakam.lol | |
13 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.behpardakht.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
api.dezhakam.lol ZeroSSL RSA Domain Secure Site CA |
2023-10-01 - 2023-12-30 |
3 months | crt.sh |
bpm.shaparak.ir Certum Extended Validation CA SHA2 |
2023-05-02 - 2024-05-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bpm.shaparak.ir/pgwchannel/result.mellat?RefId=1B2B96408DB4216E&BLOCKER_ERROR=invalidRefId
Frame ID: 0E74FF829EA0FBFE3FA9C24B7121F571
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
پرداخت اینترنتی به پرداخت ملتPage URL History Show full URLs
- https://api.dezhakam.lol/Home/RedirectToPayPage/0/?RefId=1B2B96408DB4216E Page URL
-
https://bpm.shaparak.ir/pgwchannel/startpay.mellat
HTTP 302
https://bpm.shaparak.ir/pgwchannel/result.mellat?RefId=1B2B96408DB4216E&BLOCKER_ERROR=invalidRefId Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: www.Behpardakht.com
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://api.dezhakam.lol/Home/RedirectToPayPage/0/?RefId=1B2B96408DB4216E Page URL
-
https://bpm.shaparak.ir/pgwchannel/startpay.mellat
HTTP 302
https://bpm.shaparak.ir/pgwchannel/result.mellat?RefId=1B2B96408DB4216E&BLOCKER_ERROR=invalidRefId Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
api.dezhakam.lol/Home/RedirectToPayPage/0/ |
515 B 677 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
result.mellat
bpm.shaparak.ir/pgwchannel/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
esprit_fa.min.css
bpm.shaparak.ir/pgwchannel/css/ |
162 KB 162 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.6.0.min.js
bpm.shaparak.ir/pgwchannel/js/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
messages_fa.min.js
bpm.shaparak.ir/pgwchannel/msg/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
payment.min.js
bpm.shaparak.ir/pgwchannel/js/ |
25 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shaparak_logo.svg
bpm.shaparak.ir/pgwchannel/img/ |
30 KB 31 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
behpardakht_logo.svg
bpm.shaparak.ir/pgwchannel/img/ |
19 KB 19 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mellat_arc.svg
bpm.shaparak.ir/pgwchannel/img/ |
349 B 742 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ipg-failed-ico.svg
bpm.shaparak.ir/pgwchannel/img/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mellat_arc_footer.svg
bpm.shaparak.ir/pgwchannel/img/ |
592 B 985 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IRANSansWeb_Medium.woff2
bpm.shaparak.ir/pgwchannel/css/fonts/woff2/ |
28 KB 29 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IRANSansWeb.woff2
bpm.shaparak.ir/pgwchannel/css/fonts/woff2/ |
31 KB 31 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank Mellat (Financial)132 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| i18n undefined| globalRemainingSeconds undefined| terminalDiscountStatus undefined| otpRequestWaitMillis undefined| panDtoList undefined| encRefId undefined| focusedField undefined| shuffledArray undefined| previousPan undefined| keyPadInputId undefined| previousOTPRequestMillis undefined| otpRemainingSeconds boolean| ctrlDown number| ctrlKey number| cmdKey boolean| disableCountDown boolean| paymentSuccessfullyDone boolean| successResultSubmitted number| cursorPosition number| selectedPanIndex number| previousSelectedPanIndex object| availableBankLogos function| validatePaymentInputs function| removeInvalidClassFromPan function| addInvalidClassToPan function| validatePan function| doPayment function| processSaleResponse function| refreshCaptcha function| showMessage function| hideMessage function| handleUnknownError function| validateAndDoPayment function| removeInvalidClassFromInput function| validateInput function| addInvalidClassToInput function| validateDate function| focusNextField function| focusField function| hideKeypadOnTab function| checkPattern function| setPanCursorPosition function| formatPanOnKeyDown function| shouldIgnore function| formatPanOnKeyUp function| getFormattedPan function| concatNumericChars function| extractNumbers function| preventInvalidKeys function| isNumericKeyDownOrUp function| getEventKeyCode function| cancelPay function| countDownRemainingTime function| stopCountDown function| fillField function| keypadTab function| keyPadBackspace function| setFocusedField function| shuffleKeypad function| showKeypadJustInMobile function| showLogoJustInMobile function| showKeypad function| hideKeypad function| hideOthersKeypad function| shuffle function| waitAndSendSuccessResult function| sendSuccessResult function| enableReturnButton function| hideKeypadOnOutsideClick function| hideCardSuggestionListOnOutSideClick function| showSubmitSpinner function| hideSubmitSpinner function| showBankLogoSpinner function| hideBankLogoSpinner function| checkPanDiscount function| handlePanChange function| prepare4DiscountServiceCall function| processDiscountResponse function| openDiscountDialog function| setPan function| hideDiscountDialog function| showDiscountDialog function| showDynamicPinDialog function| removeDynamicPinDialog function| setAmount function| setCardSuggestionListHeight function| filterAndShowCardSuggestionList function| toggleAllPans function| showAllPans function| showCardSuggestionList function| setBankLogo function| hideCardSuggestionList function| deleteSelectedPan function| processDeleteSelectedPanResponse function| selectPan function| scrollTopAnimated function| scrollMiddleAnimated function| cardNumberFocus function| maskExpireDate function| unmaskExpireDate function| isBankLogoAvailable function| resetSelectedPan function| getBankLogoSrc function| isNewPan function| validateAndRequestOTP function| requestOTP function| showSuccessFulMessageJustInMobile function| processOtpResponse function| disableOtpButton function| enableOtpButton function| disableCardNumber function| enableCardNumber function| disableCvv2KeyPad function| enableCvv2KeyPad function| disableCardListButton function| enableCardListButton function| disableInputCVV2 function| enableInputCVV2 function| disableInputMonth function| enableInputMonth function| disableInputYear function| enableInputYear function| disableInputMonthEnc function| enableInputMonthEnc function| disableInputYearEnc function| enableInputYearEnc function| disableCaptcha function| enableCaptcha function| showRetryMessageJustInMobile function| countDownDynamicPinRemainingTime2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bpm.shaparak.ir/pgwchannel | Name: JSESSIONID Value: F3676752E30C324404C2C6E656FBCFF0 |
|
bpm.shaparak.ir/ | Name: cookiesession1 Value: 678B28872F7F819878D6D3AC969BC90A |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.dezhakam.lol
bpm.shaparak.ir
176.56.157.159
81.12.52.58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