interbankbenefitonline.com
Open in
urlscan Pro
2606:4700:3030::ac43:c486
Malicious Activity!
Public Scan
Submission Tags: @phishunt_io
Submission: On November 28 via api from ES
Summary
This is the only time interbankbenefitonline.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Interbank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:303... 2606:4700:3030::ac43:c486 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2) | |
1 | 192.54.57.158 192.54.57.158 | 9009 (M247) (M247) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 7 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
interbankbenefitonline.com
interbankbenefitonline.com |
494 KB |
1 |
gstatic.com
fonts.gstatic.com |
11 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
googleapis.com
fonts.googleapis.com |
538 B |
1 |
onlinewebfonts.com
db.onlinewebfonts.com |
852 B |
1 |
fontawesome.com
use.fontawesome.com |
13 KB |
13 | 7 |
Domain | Requested by | |
---|---|---|
7 | interbankbenefitonline.com |
interbankbenefitonline.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | cdnjs.cloudflare.com |
interbankbenefitonline.com
|
1 | code.jquery.com |
interbankbenefitonline.com
|
1 | fonts.googleapis.com |
interbankbenefitonline.com
|
1 | db.onlinewebfonts.com |
interbankbenefitonline.com
|
1 | use.fontawesome.com |
interbankbenefitonline.com
|
13 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2020-11-13 - 2021-12-14 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-11-03 - 2021-01-26 |
3 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-11-03 - 2021-01-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://interbankbenefitonline.com/Warhol/login
Frame ID: 8B803665A899722D0592DE13EFC253B6
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href="https:\/\/use\.fontawesome\.com\/releases\/v([^>]+)\/css\//i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login
interbankbenefitonline.com/Warhol/ |
11 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
warhol.min.css
interbankbenefitonline.com/Warhol/files/css/ |
497 KB 77 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
interbankbenefitonline.com/Warhol/files/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.5.0/css/ |
50 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0c098ce56cd105e2723ca6b42ca24407
db.onlinewebfonts.com/c/ |
1 KB 852 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
interbankbenefitonline.com/Warhol/files/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 538 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.11.0/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_blue.png
interbankbenefitonline.com/Warhol/files/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logitoback.jpg
interbankbenefitonline.com/Warhol/files/img/ |
398 KB 399 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sZlLdRyC6CRYbkEaDZtQS6A.woff2
fonts.gstatic.com/s/krub/v4/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
br_down.png
interbankbenefitonline.com/Warhol/files/img/ |
288 B 993 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Interbank (Banking)31 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| start function| getController undefined| alpha undefined| schema object| temp string| pathName object| WIN object| digitalData function| $ function| jQuery function| Popper object| Tletras number| z boolean| mayus function| anadir function| mostrar function| cambiomayus function| validateCardNumber function| luhnCheck function| validate_creditcardnumber string| texto function| comprobar function| soloNumeros string| letras number| p number| a2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
interbankbenefitonline.com/ | Name: PHPSESSID Value: 7ndatjaok2pdp0ac4g3hm2d1vs |
|
.interbankbenefitonline.com/ | Name: __cfduid Value: d78638b37db2ad680c02a85c432964c1a1606522474 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
db.onlinewebfonts.com
fonts.googleapis.com
fonts.gstatic.com
interbankbenefitonline.com
use.fontawesome.com
192.54.57.158
2001:4de0:ac19::1:b:2a
23.111.9.35
2606:4700:3030::ac43:c486
2606:4700::6810:125e
2a00:1450:4001:819::2003
2a00:1450:4001:820::200a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