ird.govt.nz.ritegen.com
Open in
urlscan Pro
63.250.32.77
Malicious Activity!
Public Scan
Submission: On October 19 via api from NZ — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 18th 2021. Valid for: 3 months.
This is the only time ird.govt.nz.ritegen.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 19 | 63.250.32.77 63.250.32.77 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 142.250.185.97 142.250.185.97 | 15169 (GOOGLE) (GOOGLE) | |
19 | 2 |
ASN22612 (NAMECHEAP-NET, US)
PTR: nc-ph-2453.web-hosting.com
ird.govt.nz.ritegen.com |
ASN15169 (GOOGLE, US)
PTR: fra16s49-in-f1.1e100.net
xpagess.blogspot.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
ritegen.com
1 redirects
ird.govt.nz.ritegen.com |
438 KB |
1 |
blogspot.com
xpagess.blogspot.com |
|
19 | 2 |
Domain | Requested by | |
---|---|---|
19 | ird.govt.nz.ritegen.com |
1 redirects
ird.govt.nz.ritegen.com
|
1 | xpagess.blogspot.com |
ird.govt.nz.ritegen.com
|
19 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
secure.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ird.govt.nz.ritegen.com cPanel, Inc. Certification Authority |
2021-10-18 - 2022-01-16 |
3 months | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2021-10-04 - 2021-12-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ird.govt.nz.ritegen.com/IR%20revenue/BNZ/
Frame ID: 92328C4D5F0063AF6BC3DC3F42D55843
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
BNZ LoginBNZ LogoPage URL History Show full URLs
-
https://ird.govt.nz.ritegen.com/IR%20revenue/BNZ
HTTP 301
https://ird.govt.nz.ritegen.com/IR%20revenue/BNZ/ Page URL
Detected technologies
Imperva (Security) ExpandDetected patterns
- /_Incapsula_Resource
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: BNZ Logo
Search URL Search Domain Scan URL
Title: Current PagePersonal Banking
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Forgot password?
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Learn more about the app
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ird.govt.nz.ritegen.com/IR%20revenue/BNZ
HTTP 301
https://ird.govt.nz.ritegen.com/IR%20revenue/BNZ/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/ Redirect Chain
|
42 KB 42 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f.txt
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
175 KB 175 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1581098295914
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
50 KB 50 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
87 B 303 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serrano.css
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
2 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout.png
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
70 B 310 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout(1).png
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
70 B 310 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-store-badge.svg
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-play-badge.svg
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd(1)
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.2e53916f.chunk.js.t%C3%A9l%C3%A9chargement
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.69066654.chunk.js.t%C3%A9l%C3%A9chargement
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Incapsula_Resource
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/ |
141 KB 142 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
xpagess.blogspot.com/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Bold.woff2
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Regular.woff2
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Bold.woff
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Regular.woff
ird.govt.nz.ritegen.com/IR%20revenue/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Incapsula_Resource
ird.govt.nz.ritegen.com/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| webpackJsonp object| com_sas_ci_acs string| expires object| $jscomp object| c3 function| overridePrototypes object| Hashcode object| GeneralBase64 object| Base64 function| getDecisionParams object| spotMap function| loadDoc function| extractValue object| dataTagToEventMap function| handleInjectResponse function| windowFocused function| windowBlured function| LocalQueue object| CryptoJS function| onYouTubeIframeAPIReady function| onYouTubePlayerReady1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ird.govt.nz.ritegen.com/ | Name: ___utmvc Value: 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 |
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ird.govt.nz.ritegen.com
xpagess.blogspot.com
142.250.185.97
63.250.32.77
01e02a02093340071d1364f08f71d9f2c62e272ba902bbc4a01bc505f693fc1e
0b75840d8233a55f3be131d3b25fb113bcc8d49ee6b1b568275d8f75a4328e99
119607ec59035aa84d05f83b163b75d622b9db0ed1c936a4cb6648a53813ca2c
16486af0d6e767efe863cdb81f3ae8a0f4cbbe0c03e5ab4f2b811051a109394a
39ceb9726ab5a1982f0b6d3167f97ecec34f29a1005dce26ea2e1225f10ba237
5aad7aef8991c5251a940c6657212b0e95a93472876115d6c87f075a63a93bfb
7ffe7d1d17ffc08695ce98c62543701ce8170f66147bc3d0073532ed93b9e62e
b26a5757777fb533b708716b39c90990843cca285507d753889c353538498232
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
dc5687b50f70cb95379bfced5a0eae768dd4382cd6b393ee77d65bbdd6373fbf
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f8260d7d44cfb1f8029f9a65067d76476106c2dbf95aab7673a51198ca6b9659