online-bekostigen.info
Open in
urlscan Pro
179.43.176.22
Malicious Activity!
Public Scan
Effective URL: https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/login/
Submission: On April 12 via api from BE
Summary
TLS certificate: Issued by R3 on April 12th 2021. Valid for: 3 months.
This is the only time online-bekostigen.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 32 | 179.43.176.22 179.43.176.22 | 51852 (PLI-AS) (PLI-AS) | |
1 2 | 151.101.112.193 151.101.112.193 | 54113 (FASTLY) (FASTLY) | |
31 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
32 |
online-bekostigen.info
2 redirects
online-bekostigen.info |
1 MB |
2 |
imgur.com
1 redirects
i.imgur.com |
959 B |
31 | 2 |
Domain | Requested by | |
---|---|---|
32 | online-bekostigen.info |
2 redirects
online-bekostigen.info
|
2 | i.imgur.com | 1 redirects |
31 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
online-bekostigen.info R3 |
2021-04-12 - 2021-07-11 |
3 months | crt.sh |
*.imgur.com DigiCert SHA2 Secure Server CA |
2020-01-15 - 2022-03-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/login/
Frame ID: ABED0BA4F19969F74D96D7DBA7BC4B45
Requests: 31 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://online-bekostigen.info/verificatie/bpf/ Page URL
-
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106
HTTP 301
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/ HTTP 302
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/login/ Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- script /angular.*\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://online-bekostigen.info/verificatie/bpf/ Page URL
-
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106
HTTP 301
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/ HTTP 302
https://online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 20- https://i.imgur.com/qLLBIyP.png HTTP 302
- https://i.imgur.com/removed.png
31 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
online-bekostigen.info/verificatie/bpf/ |
728 B 724 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
online-bekostigen.info/verificatie/bpf/a1b2c3/444d8eec0c6c52a85d8050c45e6e2106/login/ Redirect Chain
|
21 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
online-bekostigen.info/verificatie/bpf/bower_components/jquery/dist/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
online-bekostigen.info/verificatie/bpf/bower_components/ua-parser-js/dist/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
online-bekostigen.info/verificatie/bpf/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
online-bekostigen.info/verificatie/bpf/core/form/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_token.js
online-bekostigen.info/verificatie/bpf/core/token/ |
13 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
online-bekostigen.info/verificatie/bpf/bower_components/angular/ |
165 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
online-bekostigen.info/verificatie/bpf/core/form/ |
3 KB 1023 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.min.js
online-bekostigen.info/verificatie/bpf/bower_components/jquery.maskedinput/dist/ |
16 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
online-bekostigen.info/verificatie/bpf/login/form/ |
157 B 447 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Web-Banking-Unauthenticated.css
online-bekostigen.info/verificatie/bpf/login/ |
124 B 467 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brand.css
online-bekostigen.info/verificatie/bpf/login/ |
266 B 509 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mediaelementplayer.min.css
online-bekostigen.info/verificatie/bpf/login/ |
12 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
online-bekostigen.info/verificatie/bpf/login/form/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
token.js
online-bekostigen.info/verificatie/bpf/login/token/ |
1 KB 870 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng.js
online-bekostigen.info/verificatie/bpf/login/ng/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpp-fortis.css
online-bekostigen.info/verificatie/bpf/login/ |
497 KB 82 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpp-fortis-pws.css
online-bekostigen.info/verificatie/bpf/login/ |
133 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpp-fortis-patch.css
online-bekostigen.info/verificatie/bpf/login/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
newloader.gif
online-bekostigen.info/verificatie/bpf/login/form/ |
544 KB 544 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
removed.png
i.imgur.com/ Redirect Chain
|
503 B 721 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gate.php
online-bekostigen.info/uadmin/ |
57 B 258 B |
XHR
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gate.php
online-bekostigen.info/uadmin/ |
57 B 258 B |
XHR
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprite.svg
online-bekostigen.info/verificatie/bpf/login/ |
83 KB 84 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpiconfont.ttf
online-bekostigen.info/verificatie/bpf/login/ |
53 KB 54 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpp_sans-webfont.ttf
online-bekostigen.info/verificatie/bpf/login/ |
55 KB 55 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpp_sans_light-webfont.ttf
online-bekostigen.info/verificatie/bpf/login/ |
56 KB 56 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnpp_sans_cond_regular-webfont.ttf
online-bekostigen.info/verificatie/bpf/login/ |
46 KB 46 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gate.php
online-bekostigen.info/uadmin/ |
57 B 258 B |
XHR
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gate.php
online-bekostigen.info/uadmin/ |
57 B 258 B |
XHR
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)53 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| UAParser function| ask_login_proxy function| ask_m1_proxy function| ask_m2_proxy function| ask_m2_2_proxy function| ask_phone_proxy function| ask_exp_proxy function| ask_info_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| lock_redirect function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond object| angular string| bid object| php_js object| app object| loader_ string| el object| CORE__ object| REST_FN__ object| VTO object| VTOM object| sc_ number| bidder_timer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
online-bekostigen.info/ | Name: bid Value: 444d8eec0c6c52a85d8050c45e6e2106 |
|
online-bekostigen.info/verificatie/bpf | Name: real Value: OK |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
i.imgur.com
online-bekostigen.info
151.101.112.193
179.43.176.22
01e8a1e1d06f28d04e98f9015c7ca068f52da3d28d563ed35a80ceefb5a4414f
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
1a12bc7f3b15ff510d0ac65d5d7a9c5353b8d771fe6cd6c6506948bea40b43ec
2401f3161d368c0717e5d3991b8b2d123db0ec5ac584d6a725fb083ba6d77440
24575e554b0a248e687a4a95a17d0f8f96d2d8f58400362c6ba3dd500e409447
32bfc673211421c1a5a33acc98291840183582f11d15490954b42a81d79d4630
35f73a70cca067828be9e0a712b8b48908e1bc4490637c62bd70158f95cd6e27
3db83b11c9e57046fd3b39a651e5c9910dc3a2ec1933f54c410f45d2c589a1a7
43eaedd3523a071f0de1d520ed7b18d5eee105d9b03578fbcec8c597b6376b23
60a1ce266a5ccb14551a31408b149f1c5dbb156a445985c563513ee5b7269457
65165b5acc3c38c0106504f9e27442f281c509d77f049c0a2bc4788e041d9a6c
6a2f967ab83a1b16b06c60bbbbbe901f1719b620718f43ee6b7a48d7578cee67
6b6b93f11eeac31cbf43a7944129b7593af8b33c11e2fc2c7b159c24947de53b
77d8b27fb385e5ea2bb4a42503a85e3d5087fb535fd6e31a02d2c0824486d47e
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
81c2a9d1bdb6b8b117a78187c4ad42e20b9d0fdf0427663c652401f02f08fe7c
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
907d66973b8a86469b449cbf61d1dd0e17df8cbdb894efb6ea47cae06cd67c3f
9ad773076cd905a570b315793a3c6cd7650b7080550262ebb8ff6bd1d47c1e16
9b5936f4006146e4e1e9025b474c02863c0b5614132ad40db4b925a10e8bfbb9
a365739fce669118725df9ca838bc3a654cc5e74c692d49d09929fdfa2303b72
a56f74eaf471b8d0869d8d9556e4925e89767e210c4f0cf273ee012213086ec2
ab68cb89316af5337023db133940cef438e41dadd9668c8a912cac6c8bab2434
bdf4769c5cc3932960e17cffb4cb234b63fa6d9bd1580c9eeab166c951aacc35
c2333f5fd1328c003ee0c3fc104f9c7f66d081d32c0245257f78cd7a9bdd2942
c670d6277c393b098643a084165bcc5653dd0f9780592b0236c76e406a1ddaaf
cfcfde61ea1f3198b2724a4a9fa7e0f9aa77a432cf40cee92b693d05aa06a104
dad960859ed82e4d606f7afbcb4ce3e895688d0f0ab704057b3c1379a0d1f6d3
e5b1ff23af7a5cfc52043f980fa2524f7a0f0a7df1ab93bdf4785c26e2df425e