bnk1001sco34-al5e1dr3t.com
Open in
urlscan Pro
91.234.99.166
Malicious Activity!
Public Scan
Effective URL: https://bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/
Submission: On November 20 via manual from CA
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 17th 2018. Valid for: 3 months.
This is the only time bnk1001sco34-al5e1dr3t.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Scotiabank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:20:... 2606:4700:20::6818:809 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 2606:4700:30:... 2606:4700:30::681b:ba0b | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 4 | 91.234.99.166 91.234.99.166 | 48666 (AS-MAROSN...) (AS-MAROSNET Moscow) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
4 | 2 |
ASN48666 (AS-MAROSNET Moscow, Russia, RU)
bnk1001sco34-al5e1dr3t.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
bnk1001sco34-al5e1dr3t.com
1 redirects
bnk1001sco34-al5e1dr3t.com |
246 KB |
1 |
gstatic.com
fonts.gstatic.com |
16 KB |
1 |
kutt.it
1 redirects
kutt.it |
472 B |
1 |
to.ly
1 redirects
to.ly |
447 B |
4 | 4 |
Domain | Requested by | |
---|---|---|
4 | bnk1001sco34-al5e1dr3t.com |
1 redirects
bnk1001sco34-al5e1dr3t.com
|
1 | fonts.gstatic.com | |
1 | kutt.it | 1 redirects |
1 | to.ly | 1 redirects |
4 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bnk1001sco34-al5e1dr3t.com cPanel, Inc. Certification Authority |
2018-11-17 - 2019-02-15 |
3 months | crt.sh |
*.google.com Google Internet Authority G3 |
2018-10-30 - 2019-01-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/
Frame ID: AF885B5AD7EA69B03B894A0B44C9C3FD
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://to.ly/1wKQa
HTTP 301
https://kutt.it/ddxkJ7 HTTP 302
https://bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3 HTTP 301
https://bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/ Page URL
Detected technologies
ZURB Foundation (Web Frameworks) ExpandDetected patterns
- html /<div [^>]*class="[^"]*(?:small|medium|large)-\d{1,2} columns/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://to.ly/1wKQa
HTTP 301
https://kutt.it/ddxkJ7 HTTP 302
https://bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3 HTTP 301
https://bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/Scotiabank-BankingWeb_files/ |
236 KB 236 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-logo.svg
bnk1001sco34-al5e1dr3t.com/sco1r7el23hs23iwe3/Scotiabank-BankingWeb_files/ |
6 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
MDadn8DQ_3oT6kvnUq_2r_esZW2xOQ-xsNqO47m55DA.woff2
fonts.gstatic.com/s/lato/v11/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Scotiabank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| check object| _cf0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bnk1001sco34-al5e1dr3t.com
fonts.gstatic.com
kutt.it
to.ly
2606:4700:20::6818:809
2606:4700:30::681b:ba0b
2a00:1450:4001:80b::2003
91.234.99.166
5ad959fa5edbc9d44fc4b1a32e006395e9cd1f65b441dc8dc0de6e33e7cc6f50
82bdfc876ae3c7a451b9aea1a3c3fa3d6053afa651bc44f98eed2b20619affdb
b3c414806e659b347c31f9205558d257b959cb5a465ba7c83943a3a8ca6aa59f
c54ab51f01b9b490939b339d65d34601798c166a252628eefc9854ecffa31f5f