![](/screenshots/09532853-4606-4aab-a6f4-250345340a73.png)
141.98.6.110
Open in
urlscan Pro
141.98.6.110
Malicious Activity!
Public Scan
Submission: On October 17 via manual from AU — Scanned from AU
Summary
This is the only time 141.98.6.110 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 141.98.6.110 141.98.6.110 | 211252 (AS_DELIS) (AS_DELIS) | |
5 | 23.215.7.6 23.215.7.6 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
8 | 2 |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-215-7-6.deploy.static.akamaitechnologies.com
secure.bnz.co.nz | |
www.bnz.co.nz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
bnz.co.nz
secure.bnz.co.nz www.bnz.co.nz |
134 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
3 | secure.bnz.co.nz |
141.98.6.110
|
2 | www.bnz.co.nz |
141.98.6.110
|
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
secure.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
bnz.co.nz Entrust Certification Authority - L1K |
2023-10-05 - 2024-10-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://141.98.6.110/auth/
Frame ID: B20F161DE0D405AEBA281B9B10957E19
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/09532853-4606-4aab-a6f4-250345340a73.png)
Page Title
BNZ LoginBNZ LogolockedPage URL History Show full URLs
-
http://141.98.6.110/auth
HTTP 301
http://141.98.6.110/auth/ Page URL
Page Statistics
6 Outgoing links
These are links going to different origins than the main page.
Title: BNZ Logo
Search URL Search Domain Scan URL
Title: Current PagePersonal
Search URL Search Domain Scan URL
Title: Business
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Forgot your password?
Search URL Search Domain Scan URL
Title: Find your Access Number
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://141.98.6.110/auth
HTTP 301
http://141.98.6.110/auth/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
141.98.6.110/auth/ Redirect Chain
|
66 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serrano.css
141.98.6.110/auth/BNZ%20Login_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sec-4-0.css
141.98.6.110/auth/BNZ%20Login_files/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.6ca2a99c.chunk.js
secure.bnz.co.nz/auth/static/js/ |
0 89 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.bb624667.chunk.js
secure.bnz.co.nz/auth/static/js/ |
0 1 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.c5c9bca4.chunk.js
secure.bnz.co.nz/auth/static/js/ |
0 3 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Bold.woff2
www.bnz.co.nz/serrano/fonts/ |
21 KB 21 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SerranoWeb-Regular.woff2
www.bnz.co.nz/serrano/fonts/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
secure.bnz.co.nz
www.bnz.co.nz
141.98.6.110
23.215.7.6
00597164b7643a1a0040f59fe7167231ba550754b16f0c7df456d7490698ba11
1a2dcd0e05beaaf4aaf7633448576d794380c8fc236837489bb3643c78faedc4
9e63cdc77de3df5b0b0685849e03d263716a22ccf56e4ed74807504dc227221c
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855