bpointer.in
Open in
urlscan Pro
162.215.208.189
Malicious Activity!
Public Scan
Submission: On October 04 via automatic, source openphish — Scanned from DE
Summary
This is the only time bpointer.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Capitec Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 162.215.208.189 162.215.208.189 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
11 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: server.bpointer.com
bpointer.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
bpointer.in
bpointer.in |
188 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | bpointer.in |
bpointer.in
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bpointer.in/lokseva/icme.ein/login_msg.php
Frame ID: CBB7B19E80A638870816312BC40A153C
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login_msg.php
bpointer.in/lokseva/icme.ein/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default-3.css
bpointer.in/lokseva/icme.ein/media/ |
55 KB 55 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.css
bpointer.in/lokseva/icme.ein/media/ |
15 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.css
bpointer.in/lokseva/icme.ein/media/ |
8 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_main.webp
bpointer.in/lokseva/icme.ein/media/ |
5 KB 6 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proceed.webp
bpointer.in/lokseva/icme.ein/media/ |
184 B 426 B |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SSL-certificate-seal-ssl-animated.webp
bpointer.in/lokseva/icme.ein/media/ |
2 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flama-basic-webfont.woff
bpointer.in/lokseva/icme.ein/media/ |
26 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flama-book-webfont.woff
bpointer.in/lokseva/icme.ein/media/ |
26 KB 26 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flama-light-webfont.woff
bpointer.in/lokseva/icme.ein/media/ |
22 KB 22 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flama-medium-webfont.woff
bpointer.in/lokseva/icme.ein/media/ |
22 KB 23 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Capitec Bank (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| check0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bpointer.in
162.215.208.189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