URL: https://bfgdl.ru.com/
Submission: On August 11 via api from JP — Scanned from JP

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 50.115.162.3, located in United States and belongs to VIRP, US. The main domain is bfgdl.ru.com.
TLS certificate: Issued by R3 on August 6th 2023. Valid for: 3 months.
This is the only time bfgdl.ru.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: BNP Paribas (Banking)

Domain & IP information

IP Address AS Autonomous System
1 50.115.162.3 32875 (VIRP)
1 2
Apex Domain
Subdomains
Transfer
1 ru.com
bfgdl.ru.com
29 KB
1 1
Domain Requested by
1 bfgdl.ru.com
1 1

This site contains no links.

Subject Issuer Validity Valid
bfgdl.ru.com
R3
2023-08-06 -
2023-11-04
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bfgdl.ru.com/
Frame ID: 2B788AB100A2024CC1D149B5E0AB68C4
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

29 kB
Transfer

35 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
bfgdl.ru.com/
28 KB
29 KB
Document
General
Full URL
https://bfgdl.ru.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
50.115.162.3 , United States, ASN32875 (VIRP, US),
Reverse DNS
exchange.modernhost.net
Software
Apache /
Resource Hash
fdd9ec7c16cd51092f49167a27313ae96116f3517901778b0d37835b9e80dec5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.170 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Fri, 11 Aug 2023 15:33:16 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked
truncated
/
7 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
99543d933ae6c6b53aa79a42deb665f785cba48b798e0420ae34e835a588f018

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/115.0.5790.170 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: BNP Paribas (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
bfgdl.ru.com/ Name: COOKIE_KEY
Value: 169176799675

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bfgdl.ru.com
50.115.162.3
99543d933ae6c6b53aa79a42deb665f785cba48b798e0420ae34e835a588f018
fdd9ec7c16cd51092f49167a27313ae96116f3517901778b0d37835b9e80dec5