pristonbdvsprets1.fra1.zeabur.app
Open in
urlscan Pro
3.126.239.156
Malicious Activity!
Public Scan
Submission: On November 17 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by WR1 on November 7th 2024. Valid for: 3 months.
This is the only time pristonbdvsprets1.fra1.zeabur.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banco de Venezuela (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 3.126.239.156 3.126.239.156 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 2a04:4e42:600... 2a04:4e42:600::485 | 54113 (FASTLY) (FASTLY) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-126-239-156.eu-central-1.compute.amazonaws.com
pristonbdvsprets1.fra1.zeabur.app |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
zeabur.app
pristonbdvsprets1.fra1.zeabur.app |
598 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 318 |
18 KB |
1 |
gstatic.com
fonts.gstatic.com |
35 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3370 |
18 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 847 |
24 KB |
13 | 5 |
Domain | Requested by | |
---|---|---|
8 | pristonbdvsprets1.fra1.zeabur.app |
pristonbdvsprets1.fra1.zeabur.app
|
2 | cdn.jsdelivr.net |
pristonbdvsprets1.fra1.zeabur.app
|
1 | fonts.gstatic.com |
pristonbdvsprets1.fra1.zeabur.app
|
1 | stackpath.bootstrapcdn.com |
pristonbdvsprets1.fra1.zeabur.app
|
1 | code.jquery.com |
pristonbdvsprets1.fra1.zeabur.app
|
13 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
bdvenlinea.banvenez.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.zeabur.app WR1 |
2024-11-07 - 2025-02-05 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2024 Q3 |
2024-07-30 - 2025-08-31 |
a year | crt.sh |
*.jquery.com Sectigo ECC Domain Validation Secure Server CA |
2024-06-25 - 2025-06-25 |
a year | crt.sh |
bootstrapcdn.com WE1 |
2024-09-20 - 2024-12-19 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pristonbdvsprets1.fra1.zeabur.app/
Frame ID: 78F4C358821302F42B474D50A5298EEE
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
BDVenlínea personasDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Axios (JavaScript libraries) Expand
Detected patterns
- /axios(@|/)([\d.]+)(?:/[a-z]+)?/axios(?:.min)?\.js
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- //cdn\.jsdelivr\.net/
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: ¿Olvidaste tu usuario o clave?
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
pristonbdvsprets1.fra1.zeabur.app/ |
16 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js.descarga
pristonbdvsprets1.fra1.zeabur.app/BDVenl%C3%ADnea%20personas_files/ |
87 KB 88 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
pristonbdvsprets1.fra1.zeabur.app/BDVenl%C3%ADnea%20personas_files/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styl.css
pristonbdvsprets1.fra1.zeabur.app/BDVenl%C3%ADnea%20personas_files/ |
329 KB 329 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
cdn.jsdelivr.net/npm/axios@1.1.2/dist/ |
26 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.slim.min.js
code.jquery.com/ |
69 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.0/dist/umd/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.4.1/js/ |
59 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
pristonbdvsprets1.fra1.zeabur.app/BDVenl%C3%ADnea%20personas_files/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AA239412.js
pristonbdvsprets1.fra1.zeabur.app/ |
1 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.jpg
pristonbdvsprets1.fra1.zeabur.app/BDVenl%C3%ADnea%20personas_files/ |
111 KB 111 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
XRXV3I6Li01BKofINeaB.woff2
fonts.gstatic.com/s/nunito/v25/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
pristonbdvsprets1.fra1.zeabur.app/ |
16 KB 16 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banco de Venezuela (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| axios function| Popper object| bootstrap function| getIP function| chcs function| chc function| cls0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
fonts.gstatic.com
pristonbdvsprets1.fra1.zeabur.app
stackpath.bootstrapcdn.com
2606:4700::6812:bcf
2a00:1450:4001:82f::2003
2a04:4e42:600::485
2a04:4e42::649
3.126.239.156
2db48f3bb76be4f40a324525d4e872882f59208122f0ea552759eb76beb97d3a
5aa53525abc5c5200c70b3f6588388f86076cd699284c23cda64e92c372a1548
6ba4fd5fb0cfb45cc5b148e63e3c348c8e5aea351d18e20df3bf093dca390e2c
7eca7cc2128aab9e82b7f675031b981928a2bbdd188835a094a4da3852bdf018
96217f1d27fb909f92b4a6b35a0d3d6775f2f0b4d136d27aee88547d3ed87357
a5ab2a00a0439854f8787a0dda775dea5377ef4905886505c938941d6854ee4f
bd2ed1ba0d2562c4524e09049b104ef4f1dac4fdd1a8de2c6bfdad37176637c8
c776195ad46333c6c9a9fe3c74502ffea9a02faf122388ea3567922cc65a3060
ceaf654b2135db225419457977699706858872afa58657479181b66f5d488d97
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
f9bcc55b790b84873ed399aa0fa604cf9b9bec3b5a94b6869e6d00bb29ff72c3
ffb6e270a7bbb1ea1b797965ae85e35760b38b98744478a4151ddee79a31d215