briskpakistan.com
Open in
urlscan Pro
147.135.46.117
Malicious Activity!
Public Scan
Submission Tags: https://phish.report @phish_report Search All
Submission: On May 04 via api from FI — Scanned from FI
Summary
This is the only time briskpakistan.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco Agrícola (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 147.135.46.117 147.135.46.117 | 16276 (OVH) (OVH) | |
12 | 1 |
ASN16276 (OVH, FR)
PTR: us1.goofyhost.com
briskpakistan.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
briskpakistan.com
briskpakistan.com |
2 MB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | briskpakistan.com |
briskpakistan.com
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://briskpakistan.com/
Frame ID: FECEEB80E0D21C7DCCF96168606E011D
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
briskpakistan.com/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
briskpakistan.com/ixfiles/ |
914 KB 914 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
positivo.svg
briskpakistan.com/ixfiles/ |
12 KB 12 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
imagen-fondo-login.jpg
briskpakistan.com/ixfiles/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-right.svg
briskpakistan.com/ixfiles/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pencil.svg
briskpakistan.com/ixfiles/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
telephone-icon.svg
briskpakistan.com/ixfiles/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
negro.svg
briskpakistan.com/img/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CIBFontSans-Light.ttf
briskpakistan.com/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CIBFontSans-Bold.ttf
briskpakistan.com/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular.ttf
briskpakistan.com/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-SemiBold.ttf
briskpakistan.com/font/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco Agrícola (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
briskpakistan.com
147.135.46.117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