![](/screenshots/46ec12a4-0baa-49da-ad35-796a88ee394a.png)
grupolivecell.com
Open in
urlscan Pro
162.241.60.157
Malicious Activity!
Public Scan
Submission: On March 14 via api from NZ — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 23rd 2022. Valid for: 3 months.
This is the only time grupolivecell.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 26 | 162.241.60.157 162.241.60.157 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2a00:1450:400... 2a00:1450:4001:811::2001 | 15169 (GOOGLE) (GOOGLE) | |
19 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-60-157.unifiedlayer.com
grupolivecell.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
26 |
grupolivecell.com
8 redirects
grupolivecell.com |
633 KB |
1 |
blogspot.com
xpagess.blogspot.com |
|
19 | 2 |
Domain | Requested by | |
---|---|---|
26 | grupolivecell.com |
8 redirects
grupolivecell.com
|
1 | xpagess.blogspot.com |
grupolivecell.com
|
19 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bnz.co.nz |
secure.bnz.co.nz |
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpcontacts.liveon.com.br R3 |
2022-01-23 - 2022-04-23 |
3 months | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2022-02-17 - 2022-05-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://grupolivecell.com/wp-admin/m/BNZ/
Frame ID: 87E7C6C0798E28849FC5C7512A003FFD
Requests: 19 HTTP requests in this frame
Screenshot
![](/screenshots/46ec12a4-0baa-49da-ad35-796a88ee394a.png)
Page Title
BNZ LoginBNZ LogoPage URL History Show full URLs
-
https://grupolivecell.com/wp-admin/m/BNZ
HTTP 301
https://grupolivecell.com/wp-admin/m/BNZ/ Page URL
Detected technologies
Detected patterns
- /_Incapsula_Resource
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: BNZ Logo
Search URL Search Domain Scan URL
Title: Current PagePersonal Banking
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Forgot password?
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Learn more about the app
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://grupolivecell.com/wp-admin/m/BNZ
HTTP 301
https://grupolivecell.com/wp-admin/m/BNZ/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/2.2e53916f.chunk.js.t%C3%A9l%C3%A9chargement HTTP 301
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/2.2e53916f.chunk.js.t%C3%A9l%C3%A9chargement/
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/main.69066654.chunk.js.t%C3%A9l%C3%A9chargement HTTP 301
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/main.69066654.chunk.js.t%C3%A9l%C3%A9chargement/
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Bold.woff2?v=1c25c2c065 HTTP 301
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Bold.woff2/?v=1c25c2c065
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Regular.woff2?v=5b6826770c HTTP 301
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Regular.woff2/?v=5b6826770c
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Regular.woff?v=f376ea958d HTTP 301
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Regular.woff/?v=f376ea958d
- https://grupolivecell.com/_Incapsula_Resource?SWKMTFSR=1&e=0.8611916967523614 HTTP 301
- https://grupolivecell.com/_Incapsula_Resource/?SWKMTFSR=1&e=0.8611916967523614
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Bold.woff?v=76b2d97853 HTTP 301
- https://grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Bold.woff/?v=76b2d97853
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
grupolivecell.com/wp-admin/m/BNZ/ Redirect Chain
|
42 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f.txt
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
175 KB 58 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1581098295914
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
50 KB 50 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c0b52ff90d000139628464bd
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
87 B 115 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serrano.css
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
2 KB 536 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
70 B 122 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout(1).png
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
70 B 107 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app-store-badge.svg
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
google-play-badge.svg
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c0b52ff90d000139628464bd(1)
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
9 KB 9 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/2.2e53916f.chunk.js.t%C3%A9l%C3%A9chargement/ Redirect Chain
|
132 KB 35 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/main.69066654.chunk.js.t%C3%A9l%C3%A9chargement/ Redirect Chain
|
132 KB 35 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_Incapsula_Resource
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/ |
141 KB 142 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
xpagess.blogspot.com/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Bold.woff2/ Redirect Chain
|
132 KB 35 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Regular.woff2/ Redirect Chain
|
132 KB 35 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Regular.woff/ Redirect Chain
|
132 KB 35 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/_Incapsula_Resource/ Redirect Chain
|
132 KB 132 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
grupolivecell.com/wp-admin/m/BNZ/BNZ%20Login_files/fonts/SerranoWeb-Bold.woff/ Redirect Chain
|
132 KB 35 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)24 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored object| webpackJsonp object| com_sas_ci_acs string| expires object| $jscomp object| c3 function| overridePrototypes object| Hashcode object| GeneralBase64 object| Base64 function| getDecisionParams object| spotMap function| loadDoc function| extractValue object| dataTagToEventMap function| handleInjectResponse function| windowFocused function| windowBlured function| LocalQueue object| CryptoJS function| onYouTubeIframeAPIReady function| onYouTubePlayerReady1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
grupolivecell.com/ | Name: ___utmvc Value: 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 |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
grupolivecell.com
xpagess.blogspot.com
162.241.60.157
2a00:1450:4001:811::2001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