accessoclientiweb.medanbh.com Open in urlscan Pro
46.4.116.229  Malicious Activity! Public Scan

URL: https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Submission Tags: tweet @atomspam #phishing #bper #bperbanca #infosec #cybersecurity #atomspam Search All
Submission: On February 14 via api from FI — Scanned from FI

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 46.4.116.229, located in Falkenstein, Germany and belongs to HETZNER-AS, DE. The main domain is accessoclientiweb.medanbh.com.
TLS certificate: Issued by R3 on February 14th 2023. Valid for: 3 months.
This is the only time accessoclientiweb.medanbh.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: BPER Banca (Banking)

Domain & IP information

IP Address AS Autonomous System
4 46.4.116.229 24940 (HETZNER-AS)
1 2606:4700::68... 13335 (CLOUDFLAR...)
5 2
Apex Domain
Subdomains
Transfer
4 medanbh.com
accessoclientiweb.medanbh.com
46 KB
1 unpkg.com
unpkg.com — Cisco Umbrella Rank: 1110
4 KB
5 2
Domain Requested by
4 accessoclientiweb.medanbh.com accessoclientiweb.medanbh.com
1 unpkg.com accessoclientiweb.medanbh.com
5 2

This site contains no links.

Subject Issuer Validity Valid
www.accessoclientiweb.medanbh.com
R3
2023-02-14 -
2023-05-15
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-06-01 -
2023-06-01
a year crt.sh

This page contains 1 frames:

Primary Page: https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Frame ID: 99B8303385D7E6172E4B4E04A0C6B029
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]+(?:([\d.])+/)?pure(?:-min)?\.css

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

50 kB
Transfer

119 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
accessoclientiweb.medanbh.com/BPER%20BANCA/
3 KB
1 KB
Document
General
Full URL
https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.4.116.229 Falkenstein, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server13.al7eah.net
Software
LiteSpeed /
Resource Hash
dff19ea1ecc7fa0e9e17ce87149eaa2e26caff0a5852022c313d665b033d4abe

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.77 Safari/537.36
accept-language
fi-FI,fi;q=0.9

Response headers

alt-svc
h3=":443"; ma=2592000, h3-29=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q043=":443"; ma=2592000, quic=":443"; ma=2592000; v="43,46"
content-encoding
br
content-length
1062
content-type
text/html; charset=UTF-8
date
Tue, 14 Feb 2023 20:29:36 GMT
server
LiteSpeed
vary
Accept-Encoding
logo.png
accessoclientiweb.medanbh.com/BPER%20BANCA/
1 KB
1 KB
Image
General
Full URL
https://accessoclientiweb.medanbh.com/BPER%20BANCA/logo.png
Requested by
Host: accessoclientiweb.medanbh.com
URL: https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.4.116.229 Falkenstein, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server13.al7eah.net
Software
LiteSpeed /
Resource Hash
5dc1ae0b875dc0d78dbc5532226f5f31b762b4d1229984f605d27bf895ab6807

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://accessoclientiweb.medanbh.com/BPER%20BANCA/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.77 Safari/537.36

Response headers

pragma
no-cache
date
Tue, 14 Feb 2023 20:29:36 GMT
cache-control
private, no-cache, no-store, must-revalidate, max-age=0
server
LiteSpeed
content-length
1238
content-type
text/html
pure-min.css
unpkg.com/purecss@2.0.5/build/
16 KB
4 KB
Stylesheet
General
Full URL
https://unpkg.com/purecss@2.0.5/build/pure-min.css
Requested by
Host: accessoclientiweb.medanbh.com
URL: https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:7baf , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2d0b11cc95b046dabdab9a5bbe9c3035d2db1d7036e644acbb9e00b7c639f3f6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://accessoclientiweb.medanbh.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.77 Safari/537.36

Response headers

date
Tue, 14 Feb 2023 20:29:36 GMT
via
1.1 fly.io
x-content-type-options
nosniff
cf-cache-status
HIT
content-encoding
br
strict-transport-security
max-age=31536000; includeSubDomains; preload
age
15159505
last-modified
Sat, 26 Oct 1985 08:15:00 GMT
fly-request-id
01GB50N9F1QSQZCFP5B78ZWKJV-fra
server
cloudflare
etag
W/"4195-XLNKX4yxaMYG7+jslQdUA8knpHQ"
vary
Accept-Encoding
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=31536000
cf-ray
79988e902cded947-HEL
jquery-latest.min.js
accessoclientiweb.medanbh.com/BPER%20BANCA/
84 KB
29 KB
Script
General
Full URL
https://accessoclientiweb.medanbh.com/BPER%20BANCA/jquery-latest.min.js
Requested by
Host: accessoclientiweb.medanbh.com
URL: https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.4.116.229 Falkenstein, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server13.al7eah.net
Software
LiteSpeed /
Resource Hash
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://accessoclientiweb.medanbh.com/BPER%20BANCA/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.77 Safari/537.36

Response headers

date
Tue, 14 Feb 2023 20:29:36 GMT
content-encoding
br
last-modified
Tue, 22 Feb 2022 16:46:42 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
29167
expires
Tue, 21 Feb 2023 20:29:36 GMT
bperlogo.jpg
accessoclientiweb.medanbh.com/BPER%20BANCA/
15 KB
15 KB
Image
General
Full URL
https://accessoclientiweb.medanbh.com/BPER%20BANCA/bperlogo.jpg
Requested by
Host: accessoclientiweb.medanbh.com
URL: https://accessoclientiweb.medanbh.com/BPER%20BANCA/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.4.116.229 Falkenstein, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server13.al7eah.net
Software
LiteSpeed /
Resource Hash
48c2f622fd8d9dc4be093aa9320584d587eabd2783b1bf787e8db982ff223957

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://accessoclientiweb.medanbh.com/BPER%20BANCA/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.77 Safari/537.36

Response headers

date
Tue, 14 Feb 2023 20:29:36 GMT
last-modified
Tue, 29 Nov 2022 12:37:52 GMT
server
LiteSpeed
content-type
image/jpeg
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
15281
expires
Tue, 21 Feb 2023 20:29:36 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: BPER Banca (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| oncontentvisibilityautostatechange function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
accessoclientiweb.medanbh.com/BPER%20BANCA Name: COOKIE_KEY
Value: 16764065764

1 Console Messages

Source Level URL
Text
network error URL: https://accessoclientiweb.medanbh.com/BPER%20BANCA/logo.png
Message:
Failed to load resource: the server responded with a status of 404 ()