bhutanjigphel.bt
Open in
urlscan Pro
202.144.133.140
Malicious Activity!
Public Scan
Submission: On March 05 via automatic, source openphish
Summary
This is the only time bhutanjigphel.bt was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 202.144.133.140 202.144.133.140 | 18024 (BTTELECOM...) (BTTELECOM-AS-AP Bhutan Telecom Ltd) | |
5 | 1 |
ASN18024 (BTTELECOM-AS-AP Bhutan Telecom Ltd, BT)
PTR: wangchu.druknet.bt
bhutanjigphel.bt |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
bhutanjigphel.bt
bhutanjigphel.bt |
60 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | bhutanjigphel.bt |
bhutanjigphel.bt
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bhutanjigphel.bt/amex/americanexpress.com-secure-login/home/email.php
Frame ID: E99001F4BBF927DD9C4DF7EFAD5977EB
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
email.php
bhutanjigphel.bt/amex/americanexpress.com-secure-login/home/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
heads.PNG
bhutanjigphel.bt/amex/americanexpress.com-secure-login/home/images/ |
21 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mainsx.PNG
bhutanjigphel.bt/amex/americanexpress.com-secure-login/home/images/ |
26 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
confirm.PNG
bhutanjigphel.bt/amex/americanexpress.com-secure-login/home/images/ |
685 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footers.PNG
bhutanjigphel.bt/amex/americanexpress.com-secure-login/home/images/ |
29 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bhutanjigphel.bt
202.144.133.140
1f6da69acdf733e814cad33a567fc373f845544b200b82d3c10d9e6fad3f0009
3c9000fc6849ec5a64759bd9b17607606b48d5fb2f7e10118aa7190b03207f6e
563f1e80975ff03f52a97f0f9f9ccfda23dd1b077e208e979839912e68efd4bd
cacb92c5fad197eef2df3ddbb84f2780e8452a9658c94689e2a0f4dd6dc6432d
d97b432ee7790173424b2cd981a5820109e2071d8db0ac2575a7635d407fe365