72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev
Open in
urlscan Pro
34.173.153.191
Malicious Activity!
Public Scan
Submission: On November 20 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R10 on September 24th 2024. Valid for: 3 months.
This is the only time 72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de Venezuela (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 34.173.153.191 34.173.153.191 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
1 | 2a04:4e42:400... 2a04:4e42:400::485 | 54113 (FASTLY) (FASTLY) | |
1 | 172.217.18.3 172.217.18.3 | 15169 (GOOGLE) (GOOGLE) | |
9 | 3 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 191.153.173.34.bc.googleusercontent.com
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev |
ASN15169 (GOOGLE, US)
PTR: fra02s19-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
replit.dev
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev |
582 KB |
1 |
gstatic.com
fonts.gstatic.com |
35 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 318 |
11 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
7 | 72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev |
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev
|
1 | fonts.gstatic.com |
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev
|
1 | cdn.jsdelivr.net |
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
bdvenlinea.banvenez.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.riker.replit.dev R10 |
2024-09-24 - 2024-12-23 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2024 Q3 |
2024-07-30 - 2025-08-31 |
a year | crt.sh |
*.gstatic.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/
Frame ID: F46101CEB4DCD0EA97BCDDB83DB2A82A
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
BDVenlínea personasDetected technologies
Axios (JavaScript libraries) ExpandDetected patterns
- /axios(@|/)([\d.]+)(?:/[a-z]+)?/axios(?:.min)?\.js
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: ¿Olvidaste tu usuario o clave?
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/ |
15 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.descarga
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/BDVenl%C3%ADnea%20personas_files/ |
87 KB 88 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/BDVenl%C3%ADnea%20personas_files/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styl.css
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/BDVenl%C3%ADnea%20personas_files/ |
329 KB 329 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
cdn.jsdelivr.net/npm/axios@1.1.2/dist/ |
26 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/BDVenl%C3%ADnea%20personas_files/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/BDVenl%C3%ADnea%20personas_files/ |
111 KB 111 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
XRXV3I6Li01BKofINeaB.woff2
fonts.gstatic.com/s/nunito/v25/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev/ |
544 B 941 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de Venezuela (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| axios function| chcs function| chc function| cls0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
72bebce6-3006-401c-8a9d-7435058635d8-00-2t37o0e7t0qlf.riker.replit.dev
cdn.jsdelivr.net
fonts.gstatic.com
172.217.18.3
2a04:4e42:400::485
34.173.153.191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