ikhtiarsyifa.com
Open in
urlscan Pro
104.21.56.92
Malicious Activity!
Public Scan
Submission: On May 02 via manual from AU — Scanned from NZ
Summary
TLS certificate: Issued by GTS CA 1P5 on March 12th 2023. Valid for: 3 months.
This is the only time ikhtiarsyifa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
18 | 104.21.56.92 104.21.56.92 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.253.118.132 172.253.118.132 | 15169 (GOOGLE) (GOOGLE) | |
19 | 2 |
ASN15169 (GOOGLE, US)
PTR: sl-in-f132.1e100.net
xpagess.blogspot.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
ikhtiarsyifa.com
ikhtiarsyifa.com |
263 KB |
1 |
blogspot.com
xpagess.blogspot.com |
|
19 | 2 |
Domain | Requested by | |
---|---|---|
18 | ikhtiarsyifa.com |
ikhtiarsyifa.com
|
1 | xpagess.blogspot.com |
ikhtiarsyifa.com
|
19 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
secure.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.ikhtiarsyifa.com GTS CA 1P5 |
2023-03-12 - 2023-06-10 |
3 months | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2023-04-03 - 2023-06-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/
Frame ID: 61D771173DAF53A24CFDFBB2C94F4EDF
Requests: 19 HTTP requests in this frame
7 Outgoing links
These are links going to different origins than the main page.
Title: BNZ Logo
Search URL Search Domain Scan URL
Title: Current PagePersonal Banking
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Forgot password?
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Learn more about the app
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/ |
42 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f.txt
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
175 KB 41 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1581098295914
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
50 KB 50 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c0b52ff90d000139628464bd
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
87 B 362 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serrano.css
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
2 KB 804 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
70 B 376 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout(1).png
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
70 B 342 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app-store-badge.svg
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
9 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google-play-badge.svg
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c0b52ff90d000139628464bd(1)
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.2e53916f.chunk.js.t%C3%A9l%C3%A9chargement
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
xpagess.blogspot.com/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Bold.woff2
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Regular.woff2
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.69066654.chunk.js.t%C3%A9l%C3%A9chargement
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_Incapsula_Resource
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/ |
141 KB 142 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_Incapsula_Resource
ikhtiarsyifa.com/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
SerranoWeb-Regular.woff
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
SerranoWeb-Bold.woff
ikhtiarsyifa.com/wp-includes/widgets/A/login/BNZ/BNZ%20Login_files/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| webpackJsonp object| com_sas_ci_acs string| expires object| $jscomp object| c3 function| overridePrototypes object| Hashcode object| GeneralBase64 object| Base64 function| getDecisionParams object| spotMap function| loadDoc function| extractValue object| dataTagToEventMap function| handleInjectResponse function| windowFocused function| windowBlured function| LocalQueue object| CryptoJS function| onYouTubeIframeAPIReady function| onYouTubePlayerReady1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ikhtiarsyifa.com/ | Name: ___utmvc Value: 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 |
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ikhtiarsyifa.com
xpagess.blogspot.com
104.21.56.92
172.253.118.132
01e02a02093340071d1364f08f71d9f2c62e272ba902bbc4a01bc505f693fc1e
0b75840d8233a55f3be131d3b25fb113bcc8d49ee6b1b568275d8f75a4328e99
119607ec59035aa84d05f83b163b75d622b9db0ed1c936a4cb6648a53813ca2c
16486af0d6e767efe863cdb81f3ae8a0f4cbbe0c03e5ab4f2b811051a109394a
39ceb9726ab5a1982f0b6d3167f97ecec34f29a1005dce26ea2e1225f10ba237
5aad7aef8991c5251a940c6657212b0e95a93472876115d6c87f075a63a93bfb
7ffe7d1d17ffc08695ce98c62543701ce8170f66147bc3d0073532ed93b9e62e
8dc1eb9e241560a135f814bc0dde5e70c610282d67684482be598347e7bab461
b26a5757777fb533b708716b39c90990843cca285507d753889c353538498232
dc5687b50f70cb95379bfced5a0eae768dd4382cd6b393ee77d65bbdd6373fbf
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f8260d7d44cfb1f8029f9a65067d76476106c2dbf95aab7673a51198ca6b9659