safaa.eworlddxn.com
Open in
urlscan Pro
69.167.160.14
Malicious Activity!
Public Scan
Effective URL: https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/log.html?cron=a6ba339e3bee508474e43ed2222e0d57
Submission: On June 20 via manual from NZ
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 19th 2021. Valid for: 3 months.
This is the only time safaa.eworlddxn.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 14 | 69.167.160.14 69.167.160.14 | 32244 (LIQUIDWEB) (LIQUIDWEB) | |
3 | 45.60.33.164 45.60.33.164 | 19551 (INCAPSULA) (INCAPSULA) | |
14 | 2 |
ASN32244 (LIQUIDWEB, US)
PTR: host.hosting-universal.com
safaa.eworlddxn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
eworlddxn.com
3 redirects
safaa.eworlddxn.com |
358 KB |
3 |
bnz.co.nz
secure.bnz.co.nz |
192 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
14 | safaa.eworlddxn.com |
3 redirects
safaa.eworlddxn.com
|
3 | secure.bnz.co.nz |
safaa.eworlddxn.com
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
secure.bnz.co.nz |
wealthnet.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
safaa.eworlddxn.com cPanel, Inc. Certification Authority |
2021-06-19 - 2021-09-17 |
3 months | crt.sh |
secure.bnz.co.nz Entrust Certification Authority - L1K |
2021-05-19 - 2022-06-11 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/log.html?cron=a6ba339e3bee508474e43ed2222e0d57
Frame ID: 143D0B7856A52FA0BE503508575A6030
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://safaa.eworlddxn.com/Kl/BNZ/
HTTP 302
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114 HTTP 301
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/ HTTP 302
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/log.html?cron=a6ba339e3bee508474e43ed2222e0d57 Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Ruxit (Analytics) Expand
Detected patterns
- script /ruxitagentjs/i
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: BNZ Logo
Search URL Search Domain Scan URL
Title: Current PagePersonal Banking
Search URL Search Domain Scan URL
Title: Business
Search URL Search Domain Scan URL
Title: Client Fund Service
Search URL Search Domain Scan URL
Title: WealthNet
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Forgot your password?
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://safaa.eworlddxn.com/Kl/BNZ/
HTTP 302
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114 HTTP 301
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/ HTTP 302
https://safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/log.html?cron=a6ba339e3bee508474e43ed2222e0d57 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
log.html
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/ Redirect Chain
|
53 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ruxitagentjs_ICA27SVfqrux_10175190917092722.js
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/ |
140 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serrano.css
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/ |
2 KB 548 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.js
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/ |
857 KB 257 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/ |
55 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.490f4688.chunk.js
secure.bnz.co.nz/auth/static/js/ |
0 189 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.1e6481a9.chunk.js
secure.bnz.co.nz/auth/static/js/ |
0 533 B |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.cd08177e.chunk.js
secure.bnz.co.nz/auth/static/js/ |
0 2 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Bold.woff2
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Regular.woff2
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Bold.woff
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Regular.woff
safaa.eworlddxn.com/Kl/BNZ/82.102.18.114/bnz_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
rb_skl01780
safaa.eworlddxn.com/auth/ |
32 KB 10 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
rb_skl01780
safaa.eworlddxn.com/auth/ |
32 KB 10 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated boolean| isIE boolean| isUnsupportedBrowser object| __BNZ_LOGIN_CLIENT object| dT_ object| dtrum object| webpackJsonp@bnz/online-login-client6 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
safaa.eworlddxn.com/ | Name: dtPC Value: -16$33118187_150h1vSXRNSSUVCFFLITNOVWSTSANOOSVETHCLe1 |
|
safaa.eworlddxn.com/ | Name: rxvt Value: 1624234918723|1624233118192 |
|
safaa.eworlddxn.com/ | Name: dtSa Value: - |
|
safaa.eworlddxn.com/ | Name: rxVisitor Value: 1624233118191NU7CF429ETGF6IVHFQ1K2IOO6L1HLHGV |
|
safaa.eworlddxn.com/ | Name: dtCookie Value: -16$KIK9HIQL3U42BPCDIVSRQ15GORL2I308 |
|
safaa.eworlddxn.com/ | Name: PHPSESSID Value: f9ccprjvkhv2hf8k99l05b7dv1 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
safaa.eworlddxn.com
secure.bnz.co.nz
45.60.33.164
69.167.160.14
2de6f8ce9afddbefffd6b4d9462cfdbb037e9efb589a597ac8727d8804681b34
4b8ed2e90e4122b5a4d52de17309801e05b83b6016985595e9f17c201eec3264
c4239fa8a0fefab645b2d3337af1cee6d312cd9c1665d8cc412cf7765cdb4ab3
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ed798605f9ed880deb636cbbf8cdadb7f8e2113b9c66d615d33f762a73d79456
ef367e60fa406a2de68e8f129474334c97aaf0e940935ca3078fcafda5664732
f8260d7d44cfb1f8029f9a65067d76476106c2dbf95aab7673a51198ca6b9659