198.199.85.242
Open in
urlscan Pro
198.199.85.242
Malicious Activity!
Public Scan
Submission: On March 02 via automatic, source openphish
Summary
This is the only time 198.199.85.242 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: National Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 198.199.85.242 198.199.85.242 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
1 | 104.108.40.181 104.108.40.181 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
14 | 3 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
198.199.85.242 |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-108-40-181.deploy.static.akamaitechnologies.com
www.bnc.ca |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
bnc.ca
www.bnc.ca |
|
14 | 1 |
Domain | Requested by | |
---|---|---|
1 | www.bnc.ca |
198.199.85.242
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bnc.ca Entrust Certification Authority - L1M |
2018-10-25 - 2020-10-25 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://198.199.85.242/banks/National/
Frame ID: C21232481AF80B9D55F43344D594F443
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
Debian (Operating Systems) ExpandDetected patterns
- headers server /Debian/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
198.199.85.242/banks/National/ |
15 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.0a92d0a0.css
198.199.85.242/banks/National/nbc_files/ |
134 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
idees.png
198.199.85.242/banks/National/ |
302 B 302 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_cadre_left.gif
198.199.85.242/images/bnc/bvi/admin/selfregistration/img/ |
337 B 337 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_cadre_center.gif
198.199.85.242/images/bnc/bvi/admin/selfregistration/img/ |
339 B 339 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_cadre_right.gif
198.199.85.242/images/bnc/bvi/admin/selfregistration/img/ |
338 B 338 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
715 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-sbip.mp4
www.bnc.ca/content/dam/videos/sbip2/ |
130 KB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gilroy-regular-webfont.e2732807.woff2
198.199.85.242/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gilroy-medium-webfont.bc511f39.woff2
198.199.85.242/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gilroy-ultralight-webfont.f7aa9c86.woff2
198.199.85.242/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
idees.png
198.199.85.242/banks/National/ |
302 B 302 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gilroy-regular-webfont.fa7bbe74.woff
198.199.85.242/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gilroy-ultralight-webfont.39eda6e5.woff
198.199.85.242/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gilroy-medium-webfont.eadb7586.woff
198.199.85.242/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: National Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.bnc.ca
104.108.40.181
198.199.85.242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