aplicativobbva.site
Open in
urlscan Pro
89.163.239.216
Malicious Activity!
Public Scan
Effective URL: https://aplicativobbva.site/bdntux_pe_web/principal.html
Submission: On December 21 via manual from ES
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on December 19th 2020. Valid for: 3 months.
This is the only time aplicativobbva.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BBVA (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 89.163.239.216 89.163.239.216 | 24961 (MYLOC-AS ...) (MYLOC-AS IP Backbone of myLoc managed IT AG) | |
12 | 1 |
ASN24961 (MYLOC-AS IP Backbone of myLoc managed IT AG, DE)
PTR: 216.239.163.89.fastwebsitebox.com
safecleanpe.com | |
aplicativobbva.site |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
aplicativobbva.site
aplicativobbva.site |
501 KB |
1 |
safecleanpe.com
1 redirects
safecleanpe.com |
258 B |
12 | 2 |
Domain | Requested by | |
---|---|---|
12 | aplicativobbva.site |
aplicativobbva.site
|
1 | safecleanpe.com | 1 redirects |
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
aplicativobbva.site cPanel, Inc. Certification Authority |
2020-12-19 - 2021-03-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://aplicativobbva.site/bdntux_pe_web/principal.html
Frame ID: 8583C848D1C72EA53208CA1B3B45A6E3
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://safecleanpe.com/
HTTP 302
https://aplicativobbva.site/bdntux_pe_web/principal.html Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://safecleanpe.com/
HTTP 302
https://aplicativobbva.site/bdntux_pe_web/principal.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
principal.html
aplicativobbva.site/bdntux_pe_web/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
libraries.v201901.min.css
aplicativobbva.site/bdntux_pe_web/files/css/ |
122 KB 122 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.v201901.min.css
aplicativobbva.site/bdntux_pe_web/files/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.1.min.js
aplicativobbva.site/bdntux_pe_web/files/js/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.cookie.js
aplicativobbva.site/bdntux_pe_web/files/js/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tippy.all.min.js
aplicativobbva.site/bdntux_pe_web/files/js/ |
52 KB 52 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
iframe-resizer-contentwindow.min.js
aplicativobbva.site/bdntux_pe_web/files/js/ |
13 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
aplicativobbva.site/bdntux_pe_web/files/js/ |
38 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ojo-mostrar-password.png
aplicativobbva.site/bdntux_pe_web/files/img/ |
777 B 1018 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BentonSans-Book.woff
aplicativobbva.site/bdntux_pe_web/files/fonts/ |
69 KB 69 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icons-coronita.woff
aplicativobbva.site/bdntux_pe_web/files/fonts/ |
36 KB 36 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BentonSans-Medium.woff
aplicativobbva.site/bdntux_pe_web/files/fonts/ |
71 KB 71 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BBVA (Financial)38 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| tippy undefined| g_ventanapopupbi function| cleanElementError function| addHasValue function| removeHasValue function| cadenaTimestamp function| validarLogin function| agregarHistorialCC function| existeHistorialCC function| obtenerUltimoHistorialCC function| getKeyServlet function| loadInitial function| cerrarLogin function| isFrectarIgual_1 function| isFrectarIgual_0 function| inicializaComboTipoDocumento function| inicializaValidacionesPorTipoDocumento function| validarCaracter function| validaAlias function| toolk_4 function| loadSelectOption function| pad function| leftpad function| showError function| showError2 function| dataValidaAlias function| obtenerParametroAdicionalParent0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aplicativobbva.site
safecleanpe.com
89.163.239.216
04f2fe9384b2112173852b7282bf981a368eae9e132fb7477f55f670fc2bde66
1de94981843ff5ddcefd03a8699cd2b98015189e71d8c5e787d9741967360e50
6bef75b7dadb11dedec7d899018b4c3d2567af42e478aa583d9ea358803040e1
70dae469f94f214b589d53521b903830a08b4fb589d47a4c269a83c79116886a
78e816c6adb11d67de6c542e9406aef70e8d44c8199d965b2d9e9387940bc15d
7af3360fe39c201b1ccbe7a726a5d3c2f0253add6616b71176f0d9e7c849a732
8e6bceab555438521eb8279cfee6e1db4360b13f8cabf38264c4101940189130
96dccaa929e6a14f0f439d8597777a97b22720516942d36fc625ae11e85c3ada
be84dcc80fdc2a11b2de293e3291c4ef2482be0c0055211c88615211b8b5739d
d51a463e56830b244d247cb1c8088496c289d9155dcfb192e14a035ed3842a9f
df41af7d3001c41f30ac8048c6e38f3ad8630db520ef0d03562b05f8ed2b357b
faef4c0bda0c3c95f57f42c990d7623eedb0d7f8174a6640ff4114f1091217ec