mellattbanke.ml
Open in
urlscan Pro
2606:4700:3035::681c:16f6
Malicious Activity!
Public Scan
Effective URL: https://mellattbanke.ml/
Submission Tags: phishing spamreports malicious Search All
Submission: On November 18 via api from BG
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 17th 2020. Valid for: a year.
This is the only time mellattbanke.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank Mellat (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 9 | 2606:4700:303... 2606:4700:3035::681c:16f6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
19 | 176.56.156.22 176.56.156.22 | 43415 (SITSCO-AS) (SITSCO-AS) | |
27 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
bankmellat.ir
ebanking.bankmellat.ir |
753 KB |
9 |
mellattbanke.ml
1 redirects
mellattbanke.ml |
7 KB |
27 | 2 |
Domain | Requested by | |
---|---|---|
19 | ebanking.bankmellat.ir |
mellattbanke.ml
ebanking.bankmellat.ir |
9 | mellattbanke.ml |
1 redirects
mellattbanke.ml
ebanking.bankmellat.ir |
27 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bankmellat.ir |
biz.bankmellat.ir |
www.cyberpolice.ir |
ebanking.bankmellat.ir |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-17 - 2021-11-16 |
a year | crt.sh |
ebanking.bankmellat.ir Certum Domain Validation CA SHA2 |
2020-02-26 - 2022-02-25 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://mellattbanke.ml/
Frame ID: 850E18D9EF1698DCAB8DFEA5EA02CE74
Requests: 27 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://mellattbanke.ml/
HTTP 301
https://mellattbanke.ml/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
6 Outgoing links
These are links going to different origins than the main page.
Title: ادامه...
Search URL Search Domain Scan URL
Title: ورود به سامانه
Search URL Search Domain Scan URL
Title: ورود به سامانه
Search URL Search Domain Scan URL
Title: وب سایت بانک
Search URL Search Domain Scan URL
Title: وب سایت پلیس فتا
Search URL Search Domain Scan URL
Title: محرمانگی اطلاعات شخصی مشتریان
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mellattbanke.ml/
HTTP 301
https://mellattbanke.ml/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
mellattbanke.ml/ Redirect Chain
|
28 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
ebanking.bankmellat.ir/ebanking/public/static/css/ |
139 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa.css
mellattbanke.ml/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
General.css
ebanking.bankmellat.ir/ebanking/public/static/css/ |
10 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Custom.css
ebanking.bankmellat.ir/ebanking/public/static/css/ |
107 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Custom.css
mellattbanke.ml/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Responsive.css
ebanking.bankmellat.ir/ebanking/public/static/css/ |
35 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.css
mellattbanke.ml/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
chartist.css
ebanking.bankmellat.ir/ebanking/public/static/ |
17 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
default.css
ebanking.bankmellat.ir/ebanking/public/static/css/themes/ |
1 KB 869 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
faBundleTitles.js
ebanking.bankmellat.ir/ebanking/public/static/ |
22 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
faBundleForms.js
ebanking.bankmellat.ir/ebanking/public/static/ |
297 KB 65 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
faBundleErrors.js
ebanking.bankmellat.ir/ebanking/public/static/ |
63 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ebanking.bankmellat.ir/ebanking/public/static/libs/jquery/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.690fe601.png
ebanking.bankmellat.ir/ebanking/public/static/images/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-small.png
ebanking.bankmellat.ir/ebanking/public/static//public/static/images/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
exit.svg
ebanking.bankmellat.ir/ebanking/public/static//public/static/icons/svg/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
captcha.php
mellattbanke.ml/ |
352 B 738 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Legal-Persons.png
ebanking.bankmellat.ir/ebanking/public/static/images/ |
82 KB 83 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Bussines-Owner.png
ebanking.bankmellat.ir/ebanking/public/static/images/ |
82 KB 82 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lang-selector.js
ebanking.bankmellat.ir/ebanking/public/static/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sample.css
ebanking.bankmellat.ir/ebanking/public/static/css/ |
41 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Sample2.css
ebanking.bankmellat.ir/ebanking/public/static/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
ebanking.bankmellat.ir/ebanking/public/static/images/ |
396 KB 396 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
faBundleTitles.js
mellattbanke.ml/public/static/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
faBundleForms.js
mellattbanke.ml/public/static/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
faBundleErrors.js
mellattbanke.ml/public/static/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank Mellat (Financial)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| titles object| forms object| errors function| $ function| jQuery undefined| zx undefined| za object| z1 object| z2 object| z3 string| locale undefined| css object| bundlesLoaded function| loadJS2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mellattbanke.ml/ | Name: PHPSESSID Value: f275b51555fceeb126b1ebb625a0de3a |
|
.mellattbanke.ml/ | Name: __cfduid Value: d52d022ced4f30f25b7d4ded2c10232ea1605699514 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ebanking.bankmellat.ir
mellattbanke.ml
176.56.156.22
2606:4700:3035::681c:16f6
01d4b74b3d04d7b1fb5dece20ffd8b1d3424106809bad034468b1066dfd640eb
0ed5d7070c7f11a4d84ec2f8f67e88db423d6b648330038e7da629a7fa65687f
0f1915e946aca747224b6a09d8d53aba4238c7e630d6ee7dc279bf6353522f68
1cc0b39ebb839c78d0602e0077bbba2fb2ec9a7e51340274939bdcb99c6f62ab
22976d8949683d95aff641c4c15bbab8e44891ede5c6997393101855ebf30a34
24a2a8083cb4f5ebef3c1eb441b6b5efb6c69fd83aed882890af241cac1ed5e3
256bb2b197cefc899459b71794b233b7ee1e949a9fc8554ec4c1d01f71f35f57
2696e2feaccf2d48b604aa48a7ce0ee13ecd484f0d7cb276dd601fac9edf0f8a
4dec504c575dafcaf5d8eb6c888f84fed4158d6e8a6798d3150ec28520639326
77235808f4b5ceaa64d56864dbb01c398c10801e7ebe2a41f403dc58eb5c085c
9abf8171e8287212f88a3242c0201e3035cf0f68d3008a7835c0d43d25b967ad
b0d9e80bcd1543fa63b7ecbc43674f6526a81e68c8e17104c6703302b7f9bc7d
bbf3d6098a70eea46db607d47d09da570193a54c0a5fc571dc6e81480375b66c
cde136e7d801f83c16c37ece0927624bfcb1aa763137a8e9e97a0447a2a0658f
d9732a8ab760f9d542173ddb793e248b7a166e8b79a40f131aca66bd25b854ab
d99894f53155cf424495d8b7a6842bb4c0fda3475dbecbbc1c0831f648112714
e0c662ac28aded602718b37f8af9a575d6243e17a2d16808a1e6854e9eaebaa5
e396e38c221a3d05e428b76c921d67b2f4e4c09279cf3c2556f87134e19cc2f7
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
fe1043821b963f0f795399e3e210f77681d8efc8fdbde1954e240e4fbe65c54d