myteloxis.com
Open in
urlscan Pro
103.86.176.28
Malicious Activity!
Public Scan
Effective URL: https://myteloxis.com/m/BNZ/
Submission: On March 14 via api from NZ — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on February 22nd 2022. Valid for: 3 months.
This is the only time myteloxis.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 45.113.122.205 45.113.122.205 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY) | |
18 | 103.86.176.28 103.86.176.28 | 135222 (MWNASHIK-...) (MWNASHIK-AS MilesWeb Internet Services Pvt Ltd) | |
1 | 2a00:1450:400... 2a00:1450:4001:80f::2001 | 15169 (GOOGLE) (GOOGLE) | |
20 | 3 |
ASN135222 (MWNASHIK-AS MilesWeb Internet Services Pvt Ltd, IN)
myteloxis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
myteloxis.com
myteloxis.com |
440 KB |
1 |
blogspot.com
xpagess.blogspot.com |
|
1 |
techvistaar.com
techvistaar.com |
198 B |
20 | 3 |
Domain | Requested by | |
---|---|---|
18 | myteloxis.com |
techvistaar.com
myteloxis.com |
1 | xpagess.blogspot.com |
myteloxis.com
|
1 | techvistaar.com | |
20 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
secure.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.cowin.jtbazaar.in R3 |
2022-02-14 - 2022-05-15 |
3 months | crt.sh |
myteloxis.com cPanel, Inc. Certification Authority |
2022-02-22 - 2022-05-23 |
3 months | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2022-02-28 - 2022-05-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://myteloxis.com/m/BNZ/
Frame ID: 6A379709142F5799764153EC3BF08350
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
BNZ LoginBNZ LogoPage URL History Show full URLs
- https://techvistaar.com/wp-admin/ym/aspx.php Page URL
- https://myteloxis.com/m/BNZ/ Page URL
Detected technologies
Imperva (Security) ExpandDetected patterns
- /_Incapsula_Resource
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: BNZ Logo
Search URL Search Domain Scan URL
Title: Current PagePersonal Banking
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Forgot password?
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Learn more about the app
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://techvistaar.com/wp-admin/ym/aspx.php Page URL
- https://myteloxis.com/m/BNZ/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
aspx.php
techvistaar.com/wp-admin/ym/ |
96 B 198 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
myteloxis.com/m/BNZ/ |
42 KB 42 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f.txt
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
175 KB 175 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1581098295914
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
50 KB 50 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
87 B 303 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serrano.css
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
2 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout.png
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
70 B 310 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout(1).png
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
70 B 310 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-store-badge.svg
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-play-badge.svg
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
c0b52ff90d000139628464bd(1)
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.2e53916f.chunk.js.t%C3%A9l%C3%A9chargement
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
99 B 305 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.69066654.chunk.js.t%C3%A9l%C3%A9chargement
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
99 B 305 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Incapsula_Resource
myteloxis.com/m/BNZ/BNZ%20Login_files/ |
141 KB 142 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
xpagess.blogspot.com/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Bold.woff2
myteloxis.com/m/BNZ/BNZ%20Login_files/fonts/ |
99 B 306 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Regular.woff2
myteloxis.com/m/BNZ/BNZ%20Login_files/fonts/ |
99 B 305 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Bold.woff
myteloxis.com/m/BNZ/BNZ%20Login_files/fonts/ |
99 B 305 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SerranoWeb-Regular.woff
myteloxis.com/m/BNZ/BNZ%20Login_files/fonts/ |
99 B 305 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_Incapsula_Resource
myteloxis.com/ |
99 B 99 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored object| webpackJsonp object| $jscomp object| com_sas_ci_acs object| c3 function| overridePrototypes object| Hashcode object| GeneralBase64 object| Base64 function| getDecisionParams object| spotMap function| loadDoc function| extractValue object| dataTagToEventMap function| handleInjectResponse function| windowFocused function| windowBlured function| LocalQueue object| CryptoJS function| onYouTubeIframeAPIReady function| onYouTubePlayerReady string| expires1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
myteloxis.com/ | Name: ___utmvc Value: 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 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
myteloxis.com
techvistaar.com
xpagess.blogspot.com
103.86.176.28
2a00:1450:4001:80f::2001
45.113.122.205
01e02a02093340071d1364f08f71d9f2c62e272ba902bbc4a01bc505f693fc1e
0b75840d8233a55f3be131d3b25fb113bcc8d49ee6b1b568275d8f75a4328e99
119607ec59035aa84d05f83b163b75d622b9db0ed1c936a4cb6648a53813ca2c
16486af0d6e767efe863cdb81f3ae8a0f4cbbe0c03e5ab4f2b811051a109394a
39ceb9726ab5a1982f0b6d3167f97ecec34f29a1005dce26ea2e1225f10ba237
5aad7aef8991c5251a940c6657212b0e95a93472876115d6c87f075a63a93bfb
7ffe7d1d17ffc08695ce98c62543701ce8170f66147bc3d0073532ed93b9e62e
b26a5757777fb533b708716b39c90990843cca285507d753889c353538498232
d2cb8bca0828ca1a3441b266a6cddd6deb67f53dbce7ebd25372cc575b90ab38
dc5687b50f70cb95379bfced5a0eae768dd4382cd6b393ee77d65bbdd6373fbf
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f8260d7d44cfb1f8029f9a65067d76476106c2dbf95aab7673a51198ca6b9659