www.bnk.b1b.biyns.xyz
Open in
urlscan Pro
192.71.144.145
Malicious Activity!
Public Scan
Effective URL: https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/EMbpEBX/eatlead.php
Submission: On April 12 via automatic, source openphish
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 11th 2018. Valid for: 3 months.
This is the only time www.bnk.b1b.biyns.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Kiwibank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 17 | 192.71.144.145 192.71.144.145 | 42708 (PORTLANE ...) (PORTLANE www.portlane.com) | |
16 | 1 |
ASN42708 (PORTLANE www.portlane.com, SE)
PTR: foss4.datechating24.com
www.bnk.b1b.biyns.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
biyns.xyz
1 redirects
www.bnk.b1b.biyns.xyz |
303 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
17 | www.bnk.b1b.biyns.xyz |
1 redirects
www.bnk.b1b.biyns.xyz
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.ib.bnk.biyns.xyz Let's Encrypt Authority X3 |
2018-04-11 - 2018-07-10 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/EMbpEBX/eatlead.php
Frame ID: E1D617F234136029F4BCC34239F25CFE
Requests: 1 HTTP requests in this frame
Frame:
https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/kiwi.php
Frame ID: 2459EAD24B055363CC4B2451FB57DED0
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/
HTTP 302
https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/EMbpEBX/eatlead.php Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/
HTTP 302
https://www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/EMbpEBX/eatlead.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
eatlead.php
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/i/EMbpEBX/ Redirect Chain
|
384 B 474 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kiwi.php
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/ Frame 2459 |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
157 KB 157 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.js
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
61 KB 61 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keepsafe_logo_login.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fraudwatch-logo-266.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
print.css
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
body.gif
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-blue-sm-right.gif
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
49 B 356 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-padlock-sprite.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
button-bg-round.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-block-header-light.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
313 B 622 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Meta-Serif-Web-Pro-Bold.woff
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
53 KB 54 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
raymond-footer.png
www.bnk.b1b.biyns.xyz/kiwiwealth893/kunt/fucktard/inc/ Frame 2459 |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Kiwibank (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.bnk.b1b.biyns.xyz
192.71.144.145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