202.22.143.5
Open in
urlscan Pro
202.22.143.5
Malicious Activity!
Public Scan
Submission: On February 05 via automatic, source openphish
Summary
This is the only time 202.22.143.5 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 202.22.143.5 202.22.143.5 | 56089 (OFFRATEL-...) (OFFRATEL-AS-AP OFFRATEL) | |
23 | 2 |
ASN56089 (OFFRATEL-AS-AP OFFRATEL, NC)
PTR: host-202-22-143-5.static.lagoon.nc
202.22.143.5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
0 |
bnz.co.nz
Failed
collection.bnz.co.nz Failed |
|
23 | 1 |
Domain | Requested by | |
---|---|---|
0 | collection.bnz.co.nz Failed |
202.22.143.5
|
23 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://202.22.143.5/uebimiau/.link/
Frame ID: 20D9111F7E3BE939FF2CACB1A29F127E
Requests: 23 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Prototype (JavaScript Frameworks) Expand
Detected patterns
- script /(?:prototype|protoaculous)(?:-([\d.]*[\d]))?.*\.js/i
- env /^Prototype$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
202.22.143.5/uebimiau/.link/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles-ib.css
202.22.143.5/uebimiau/.link/login_files/ |
85 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.css
202.22.143.5/uebimiau/.link/login_files/ |
21 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.js
202.22.143.5/uebimiau/.link/login_files/ |
100 KB 39 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
prototype-1.js
202.22.143.5/uebimiau/.link/login_files/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
former-inline-scripts.js
202.22.143.5/uebimiau/.link/login_files/ |
426 B 553 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tooltip-caps.js
202.22.143.5/uebimiau/.link/login_files/ |
735 B 707 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
getbrowserdata.js
202.22.143.5/uebimiau/.link/login_files/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cview3.js
202.22.143.5/uebimiau/.link/login_files/ |
581 B 737 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-bnz-logo.png
202.22.143.5/uebimiau/.link/login_files/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnz-requestprocessing-icon-trans.gif
202.22.143.5/uebimiau/.link/login_files/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnz_002.js
202.22.143.5/uebimiau/.link/login_files/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.js
202.22.143.5/uebimiau/.link/login_files/ |
196 KB 60 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnz.js
202.22.143.5/uebimiau/.link/login_files/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnzib.js
202.22.143.5/uebimiau/.link/login_files/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnzformat.js
202.22.143.5/uebimiau/.link/login_files/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnzutils.js
202.22.143.5/uebimiau/.link/login_files/ |
12 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SpeedTrapInsert.js
202.22.143.5/uebimiau/.link/login_files/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tag
202.22.143.5/uebimiau/.link/ |
216 B 464 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serranoweb-bold-webfont.woff
202.22.143.5/uebimiau/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serranoweb-bold-webfont.ttf
202.22.143.5/uebimiau/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
cImage.bmp
collection.bnz.co.nz/WEOIWMPIJ/1549397992712/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bnz-requestprocessing-icon-trans.gif
202.22.143.5/ib/images/ |
244 B 244 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- collection.bnz.co.nz
- URL
- https://collection.bnz.co.nz/WEOIWMPIJ/1549397992712/cImage.bmp?c=&d=true
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)156 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery object| Prototype object| Abstract object| Try object| Class function| PeriodicalExecuter function| Template object| $break object| Enumerable function| $A function| $w function| $H function| Hash function| $R function| ObjectRange object| Ajax object| Form object| Field function| $F object| Toggle object| Insertion object| $continue object| Position function| $$ undefined| Sizzle function| Selector function| $j function| onLoadHandler function| showTooltip function| hideTooltip function| setupCapsLockValidation function| validateCapsLock function| checkCookie object| getBrowser function| getBrowserData function| updateCookieCview function| writeImage function| submitData function| bnzCustomValidation function| doOnLoad object| BNZ function| DP_jQuery_1549397992703 function| isValidCharacters function| isValidTextBoxCharacters function| isDiscretionaryData function| isBlank function| isAlphaNumeric function| isAlphabetic function| isNumeric function| isPositiveOrNegativeNumeric function| isWholeNumber function| isName function| isNameWithNumbers function| isSpecialChars function| isClientSpecialChars function| isStreetNumber function| isValidAccessNumber function| isValidIRDNumber function| isValidUserID function| isValidPassword function| isValidPin function| isValidCIFAccountNumber function| isValidAccountNumber function| isValidOtherAccountNumber function| isValidAcctNumber function| isEmail function| isPhoneNumber function| isTokenSerialNumber function| addDays function| dayDiff function| isValidDate function| isDate function| check_date function| check_valid_date function| validate_date function| leftOver function| leftOut function| invalidMask function| changeFocus function| numCount string| browserName function| setupValidation undefined| timeseconds undefined| timediff boolean| doubleSubmitLock function| SetTimer function| show_time function| hideButtons function| autoTab function| autoTabWithMaxlength function| parseAccountNumber function| setFocus function| submitForm function| confirmAction function| confirmCancel function| openHelp function| clickOnEnter function| setupClickOnEnter function| setScrollToValue function| windowScrollTo function| getFieldValue function| setFieldValue undefined| errors undefined| errIndex function| addError function| clearError function| displayCSErrorTable function| insertAfter function| clearErrors function| clearInfos object| validation function| setupJS function| inProgress function| addValidation function| verifyFields function| clearPasswordFields function| isRadioSelected function| findParentForm undefined| waitDialog boolean| waiting function| setupDialog function| closeDialog function| hideWaiting boolean| submitAllowed boolean| bnzcsaGL function| bnzcsaSL boolean| bnzcsaPrerendering function| bnzcsahandleVisibilityChange string| bnzcsacompatVersion boolean| bnzcsaLF string| bnzcsaTCP string| bnzcsaSSL function| bnzcsagPr function| bnzcsagK function| bnzcsagC function| bnzcsaGD function| bnzcsaSC function| bnzcsaae function| bnzcsaclient_event function| bnzcsaGP function| bnzcsaGPWID function| bnzcsaLC string| bnzcsaTWID string| bnzcsawindowID function| bnzcsagetSD number| bnzcsaTm object| sImgArr string| bnzcsaPII number| bnzcsaSF object| inputs object| forms object| defaultButtons0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
collection.bnz.co.nz
collection.bnz.co.nz
202.22.143.5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