www.antilles.guyane.bnpparibas.depilya.co
Open in
urlscan Pro
167.86.93.59
Malicious Activity!
Public Scan
Submission: On November 13 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on November 12th 2020. Valid for: 3 months.
This is the only time www.antilles.guyane.bnpparibas.depilya.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 167.86.93.59 167.86.93.59 | 51167 (CONTABO) (CONTABO) | |
1 | 2a00:1450:400... 2a00:1450:4001:816::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a04:4e42:1b:... 2a04:4e42:1b::621 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 4 |
ASN51167 (CONTABO, DE)
PTR: vmi254461.contaboserver.net
www.antilles.guyane.bnpparibas.depilya.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
depilya.co
www.antilles.guyane.bnpparibas.depilya.co |
28 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
11 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net |
15 KB |
1 |
googleapis.com
ajax.googleapis.com |
30 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
10 | www.antilles.guyane.bnpparibas.depilya.co |
www.antilles.guyane.bnpparibas.depilya.co
|
1 | cdnjs.cloudflare.com |
www.antilles.guyane.bnpparibas.depilya.co
|
1 | cdn.jsdelivr.net |
www.antilles.guyane.bnpparibas.depilya.co
|
1 | ajax.googleapis.com |
www.antilles.guyane.bnpparibas.depilya.co
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
antilles-guyane.bnpparibas.depilya.co Let's Encrypt Authority X3 |
2020-11-12 - 2021-02-10 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-10-28 - 2021-01-20 |
3 months | crt.sh |
f3.shared.global.fastly.net GlobalSign CloudSSL CA - SHA256 - G3 |
2020-10-26 - 2021-04-17 |
6 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.antilles.guyane.bnpparibas.depilya.co/
Frame ID: 7F0E16AEF06F5CE9BF6EC5769300668F
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.antilles.guyane.bnpparibas.depilya.co/ |
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dciweb.css
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnp.css
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
16 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
headerBack.jpg
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
10 KB 10 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
etape1.png
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
476 B 799 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
etape2.png
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
567 B 890 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dciweb96e2.png
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flecheCorriger.png
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
538 B 861 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_valider.png
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_annuler.png
www.antilles.guyane.bnpparibas.depilya.co/BNPPARIBAS%20NET%20IDENTIFICATION_files/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sweetalert2.all.min.js
cdn.jsdelivr.net/npm/sweetalert2@7.26.11/dist/ |
60 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sweetalert.min.js
cdnjs.cloudflare.com/ajax/libs/sweetalert/2.1.2/ |
40 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)28 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| theBody function| clearParams function| control function| submitform function| key function| pwd_writeM number| CellX number| CellY number| col number| lig object| tabcar number| posX number| posY number| posX1 number| posY1 function| $ function| jQuery function| Sweetalert2 function| SweetAlert function| Swal function| sweetAlert function| swal function| setImmediate function| clearImmediate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
www.antilles.guyane.bnpparibas.depilya.co
167.86.93.59
2606:4700::6810:135e
2a00:1450:4001:816::200a
2a04:4e42:1b::621
0635d965c9c0bc6b7958c2f4a30fecf1e70f67c68cb8caf520dfa8b910d6b4f0
2ac46ebee46d515be86deeba385b4e41f8cff160364b362c9a6e153df327c66b
376f54d160aa8cc5ded3a0e02a22429a5914060f0b67b877ec07d216d591c80a
4e15de1e26fa88cfe6c16caf113c4e2dcc00e9cad20b613ccdad5831937e1603
4ede7bb44d8cdb4447d0e9589c5ce0980725605bbb6193f96be49d72fd7b4827
69613cf59b48e5b3762119469f32715e4546d170725d1675d1fd02a364de7d3a
6965c967fe2474e34f024a08618c84e9f995c3482a3c46e793b9eca4b00d82e2
8a56cd2b0b8b3fb49bbd0502d7ad0ad6d01e955a0e270b68ccc83bf03dd9d25b
955510e34da1928b4ab68f72385e6281ffdf2e5c4326c70cb73f914579bb9c43
99c5135aa6eed33bf4ad8aa53556a5b3a508e9a0fab486cc25806090831c57cd
acddae1d419ff74f0918bf7975c8e96729f43fdd478af7110b03ff3c68cbb434
f7ac02953144040664d7bbcbe0ef5af6ad2966a546de3846931557852538d5be
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d