vrezawv.dyndns.ws
Open in
urlscan Pro
45.66.217.147
Malicious Activity!
Public Scan
Submission: On September 05 via automatic, source phishtank — Scanned from JP
Summary
TLS certificate: Issued by R11 on September 2nd 2024. Valid for: 3 months.
This is the only time vrezawv.dyndns.ws was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNP Paribas (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
21 | 45.66.217.147 45.66.217.147 | 3258 (XTOM-JAPA...) (XTOM-JAPAN xTom Japan) | |
2 | 2404:6800:400... 2404:6800:4004:80f::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2404:6800:400... 2404:6800:4004:825::2003 | 15169 (GOOGLE) (GOOGLE) | |
26 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
dyndns.ws
vrezawv.dyndns.ws |
589 KB |
2 |
gstatic.com
fonts.gstatic.com |
77 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
3 KB |
0 |
inovaperf.me
Failed
fathuioj.inovaperf.me Failed |
|
26 | 4 |
Domain | Requested by | |
---|---|---|
21 | vrezawv.dyndns.ws |
vrezawv.dyndns.ws
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | fonts.googleapis.com |
vrezawv.dyndns.ws
|
0 | fathuioj.inovaperf.me Failed | |
26 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vrezawv.dyndns.ws R11 |
2024-09-02 - 2024-12-01 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-08-05 - 2024-10-28 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-08-05 - 2024-10-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://vrezawv.dyndns.ws/abuiodse/
Frame ID: EA3A7FB76F6D97E0B7CE23F2B15708CB
Requests: 26 HTTP requests in this frame
Screenshot
Page Title
Accéder à mes comptes en ligneDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
26 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
vrezawv.dyndns.ws/abuiodse/ |
35 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
152 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
helpers.css
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
41 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo2.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo3.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
header-right.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
header-right2.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
621 B 836 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
reset.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
607 B 822 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
462 B 677 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
757 B 972 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
714 B 929 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
918 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.png
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.1.min.js.t%C3%A9l%C3%A9charger
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
88 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js.t%C3%A9l%C3%A9charger
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
77 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.js.t%C3%A9l%C3%A9charger
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
1 MB 473 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.min.js.t%C3%A9l%C3%A9charger
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js.js.t%C3%A9l%C3%A9charger
vrezawv.dyndns.ws/abuiodse/Acc%C3%A9der%20%C3%A0%20mes%20comptes%20en%20ligne_files/ |
31 B 251 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
23 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
5 KB 573 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img.jpg
vrezawv.dyndns.ws/abuiodse/imgs/ |
808 B 808 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
HhyaU5sn9vOmLzloC_U.woff2
fonts.gstatic.com/s/dosis/v32/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v40/ |
47 KB 47 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ff.png
fathuioj.inovaperf.me/bnp/auth/media/imgs/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fathuioj.inovaperf.me
- URL
- https://fathuioj.inovaperf.me/bnp/auth/media/imgs/ff.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNP Paribas (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| uidEvent object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome object| $jscomp0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15768000; includeSubDomains |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fathuioj.inovaperf.me
fonts.googleapis.com
fonts.gstatic.com
vrezawv.dyndns.ws
fathuioj.inovaperf.me
2404:6800:4004:80f::200a
2404:6800:4004:825::2003
45.66.217.147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