Submitted URL: http://bv-vkf-grsm.com/
Effective URL: http://bv-vkf-grsm.com/error.html
Submission Tags: https://phish.report @phish_report Search All
Submission: On December 02 via api from FI — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 190.14.39.232, located in Panama City, Panama and belongs to Offshore Racks S.A, PA. The main domain is bv-vkf-grsm.com.
This is the only time bv-vkf-grsm.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Denizbank (Banking)

Domain & IP information

IP Address AS Autonomous System
3 190.14.39.232 52469 (Offshore ...)
3 1
Apex Domain
Subdomains
Transfer
3 bv-vkf-grsm.com
bv-vkf-grsm.com
184 KB
3 1
Domain Requested by
3 bv-vkf-grsm.com bv-vkf-grsm.com
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://bv-vkf-grsm.com/error.html
Frame ID: 463367FF676898FDC16124593BAA97EE
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://bv-vkf-grsm.com/ Page URL
  2. http://bv-vkf-grsm.com/error.html Page URL

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

184 kB
Transfer

183 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://bv-vkf-grsm.com/ Page URL
  2. http://bv-vkf-grsm.com/error.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
bv-vkf-grsm.com/
55 B
266 B
Document
General
Full URL
http://bv-vkf-grsm.com/
Protocol
HTTP/1.1
Server
190.14.39.232 Panama City, Panama, ASN52469 (Offshore Racks S.A, PA),
Reverse DNS
cpanel16.offshoreracks.com
Software
Apache /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Thu, 02 Dec 2021 20:12:06 GMT
Server
Apache
Keep-Alive
timeout=1, max=60
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Primary Request error.html
bv-vkf-grsm.com/
397 B
638 B
Document
General
Full URL
http://bv-vkf-grsm.com/error.html
Requested by
Host: bv-vkf-grsm.com
URL: http://bv-vkf-grsm.com/
Protocol
HTTP/1.1
Server
190.14.39.232 Panama City, Panama, ASN52469 (Offshore Racks S.A, PA),
Reverse DNS
cpanel16.offshoreracks.com
Software
Apache /
Resource Hash
828e7a1a18499a83d7bdfa62617ad915c24e9dbdfd12a178c18acd9f80ccafef

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Referer
http://bv-vkf-grsm.com/

Response headers

Date
Thu, 02 Dec 2021 20:12:07 GMT
Server
Apache
Last-Modified
Thu, 18 Nov 2021 15:05:00 GMT
Accept-Ranges
bytes
Content-Length
397
Keep-Alive
timeout=1, max=60
Connection
Keep-Alive
Content-Type
text/html
xcc.jpeg
bv-vkf-grsm.com/
183 KB
183 KB
Image
General
Full URL
http://bv-vkf-grsm.com/xcc.jpeg
Requested by
Host: bv-vkf-grsm.com
URL: http://bv-vkf-grsm.com/error.html
Protocol
HTTP/1.1
Server
190.14.39.232 Panama City, Panama, ASN52469 (Offshore Racks S.A, PA),
Reverse DNS
cpanel16.offshoreracks.com
Software
Apache /
Resource Hash
ba6c85733013a895ffb2eae7b89918efb38c1edd0ff19fb7dc30724c6d5d0738

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://bv-vkf-grsm.com/error.html
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Thu, 02 Dec 2021 20:12:07 GMT
Last-Modified
Thu, 18 Nov 2021 15:05:00 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=59
Content-Length
187435

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Denizbank (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bv-vkf-grsm.com
190.14.39.232
828e7a1a18499a83d7bdfa62617ad915c24e9dbdfd12a178c18acd9f80ccafef
ba6c85733013a895ffb2eae7b89918efb38c1edd0ff19fb7dc30724c6d5d0738