bnl.192-121-102-198.cprapid.com
Open in
urlscan Pro
192.121.102.198
Malicious Activity!
Public Scan
Submission: On February 02 via automatic, source phishtank — Scanned from NL
Summary
TLS certificate: Issued by Buypass Class 2 CA 5 on January 29th 2024. Valid for: 6 months.
This is the only time bnl.192-121-102-198.cprapid.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 192.121.102.198 192.121.102.198 | 1299 (TWELVE99 ...) (TWELVE99 Arelion) | |
1 | 2606:4700::68... 2606:4700::6810:7eaf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 3 |
ASN1299 (TWELVE99 Arelion, fka Telia Carrier, SE)
PTR: 192-121-102-198.cust.norisab.net
bnl.192-121-102-198.cprapid.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cprapid.com
bnl.192-121-102-198.cprapid.com |
68 KB |
1 |
unpkg.com
unpkg.com — Cisco Umbrella Rank: 867 |
4 KB |
0 |
kaspersky-labs.com
Failed
gc.kis.v2.scr.kaspersky-labs.com Failed |
|
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | bnl.192-121-102-198.cprapid.com |
bnl.192-121-102-198.cprapid.com
|
1 | unpkg.com |
bnl.192-121-102-198.cprapid.com
|
0 | gc.kis.v2.scr.kaspersky-labs.com Failed |
bnl.192-121-102-198.cprapid.com
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bnl.192-121-102-198.cprapid.com Buypass Class 2 CA 5 |
2024-01-29 - 2024-07-26 |
6 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-02 - 2024-05-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bnl.192-121-102-198.cprapid.com/it/errore.html
Frame ID: E6C183743EE818CFCAB5159BC8512C35
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
errore.html
bnl.192-121-102-198.cprapid.com/it/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pure-min.css
unpkg.com/purecss@2.0.5/build/ |
16 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-pincode-autotab.css
bnl.192-121-102-198.cprapid.com/it/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-latest.min.js
bnl.192-121-102-198.cprapid.com/it/ |
84 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-pincode-autotab.min.js
bnl.192-121-102-198.cprapid.com/it/ |
2 KB 921 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpg
bnl.192-121-102-198.cprapid.com/it/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alert.png
bnl.192-121-102-198.cprapid.com/it/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
main.js
gc.kis.v2.scr.kaspersky-labs.com/FD126C42-EBFA-4E12-B309-BB3FDD723AC1/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- gc.kis.v2.scr.kaspersky-labs.com
- URL
- http://gc.kis.v2.scr.kaspersky-labs.com/FD126C42-EBFA-4E12-B309-BB3FDD723AC1/main.js?attr=c_4dc3oUFMrheLxT-F4yglO5V2Sx3Uyqzx2C87kqjT5mh94t34ObidMHYOBiiQq7
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| valore0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bnl.192-121-102-198.cprapid.com
gc.kis.v2.scr.kaspersky-labs.com
unpkg.com
gc.kis.v2.scr.kaspersky-labs.com
192.121.102.198
2606:4700::6810:7eaf
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2d0b11cc95b046dabdab9a5bbe9c3035d2db1d7036e644acbb9e00b7c639f3f6
65ad77d6886911eef6445f9fc30de95def484181de83a362a3687e06f8a759a5
99543d933ae6c6b53aa79a42deb665f785cba48b798e0420ae34e835a588f018
d6e395ef50c1564cf0f11e41a5a4ed81589b403c5a73177735d51cb1ffcfb852
e4d615de09a41c8c2d8d395a3ab156ce9520a9fc96c23b1780bb2adab4292b67