binayakhonda.com
Open in
urlscan Pro
103.212.120.133
Malicious Activity!
Public Scan
Submission: On September 10 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 14th 2023. Valid for: 3 months.
This is the only time binayakhonda.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banrural (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 103.212.120.133 103.212.120.133 | 135222 (MWNASHIK-...) (MWNASHIK-AS MilesWeb Internet Services Pvt Ltd) | |
1 | 16.16.177.149 16.16.177.149 | 16509 (AMAZON-02) (AMAZON-02) | |
10 | 2 |
ASN135222 (MWNASHIK-AS MilesWeb Internet Services Pvt Ltd, IN)
PTR: glitter.herosite.pro
binayakhonda.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-16-16-177-149.eu-north-1.compute.amazonaws.com
wurfl.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
binayakhonda.com
binayakhonda.com |
46 KB |
1 |
wurfl.io
wurfl.io — Cisco Umbrella Rank: 28349 |
2 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
9 | binayakhonda.com |
binayakhonda.com
|
1 | wurfl.io |
binayakhonda.com
|
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
binayakhonda.com cPanel, Inc. Certification Authority |
2023-08-14 - 2023-11-12 |
3 months | crt.sh |
wurfl.io Amazon RSA 2048 M01 |
2023-08-23 - 2024-09-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://binayakhonda.com/.rusecure/home-secure-login.html
Frame ID: 80000541C8A17051B290107BA2D85C96
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
home-secure-login.html
binayakhonda.com/.rusecure/ |
2 KB 899 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
binayakhonda.com/.rusecure/css/ |
2 KB 764 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo2.png
binayakhonda.com/.rusecure/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
person-fill.svg
binayakhonda.com/.rusecure/img/ |
225 B 216 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lock-fill.svg
binayakhonda.com/.rusecure/img/ |
273 B 243 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
binayakhonda.com/.rusecure/js/ |
121 B 192 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wurfl.js
wurfl.io/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
form1.js
binayakhonda.com/.rusecure/js/ |
14 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.js
binayakhonda.com/.rusecure/js/ |
16 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.jpeg
binayakhonda.com/.rusecure/img/ |
30 KB 30 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banrural (Banking)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| WURFL undefined| WurflJSNavigatorUAData undefined| newEvent object| WURFLPromises function| _0x42874d function| _0x55d4c6 function| _0x3c32 function| _0x44e3 function| _0x5bbb function| _0x658a57 function| _0x397d function| showDollarValue function| _0x44bc760 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=300; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
binayakhonda.com
wurfl.io
103.212.120.133
16.16.177.149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