bnz-online.net
Open in
urlscan Pro
146.0.76.67
Malicious Activity!
Public Scan
Effective URL: https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/login/
Submission: On October 20 via api from NZ
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 18th 2020. Valid for: 3 months.
This is the only time bnz-online.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 24 | 146.0.76.67 146.0.76.67 | 57043 (HOSTKEY-AS) (HOSTKEY-AS) | |
22 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
24 |
bnz-online.net
2 redirects
bnz-online.net |
100 KB |
22 | 1 |
Domain | Requested by | |
---|---|---|
24 | bnz-online.net |
2 redirects
bnz-online.net
|
22 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bnz-online.net cPanel, Inc. Certification Authority |
2020-10-18 - 2021-01-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/login/
Frame ID: 67C19BCA91125FC16EE660B55BD37FE4
Requests: 22 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://bnz-online.net/ Page URL
-
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7
HTTP 301
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/ HTTP 302
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/login/ Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://bnz-online.net/ Page URL
-
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7
HTTP 301
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/ HTTP 302
https://bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
bnz-online.net/ |
721 B 553 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7/login/ Redirect Chain
|
12 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
bnz-online.net/bower_components/jquery/dist/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ua-parser.min.js
bnz-online.net/bower_components/ua-parser-js/dist/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
bnz-online.net/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
core_form.js
bnz-online.net/core/form/ |
11 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
core_form.css
bnz-online.net/core/form/ |
123 B 186 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
core_token.js
bnz-online.net/core/token/ |
15 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
core_token.css
bnz-online.net/core/token/ |
912 B 390 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css.css
bnz-online.net/login/form/ |
358 B 251 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
bnz-online.net/login/ |
19 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo1.png
bnz-online.net/login/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout.png
bnz-online.net/login/ |
70 B 110 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logout_001.png
bnz-online.net/login/ |
70 B 107 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
form.js
bnz-online.net/login/form/ |
4 KB 861 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
token.js
bnz-online.net/login/token/ |
1 KB 521 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serranoweb-bold.woff2
bnz-online.net/login/ |
21 KB 21 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
serranoweb-regular.woff2
bnz-online.net/login/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home.php
bnz-online.net/ |
56 B 104 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home.php
bnz-online.net/ |
56 B 89 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home.php
bnz-online.net/ |
56 B 112 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home.php
bnz-online.net/ |
56 B 112 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)39 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery function| UAParser function| next__ function| finish__ object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| ask_question_proxy function| ask_login_proxy function| ask_biz_login_proxy function| ask_pers_token_proxy function| ask_biz_token_proxy function| ask_info_proxy function| ask_sms_proxy function| ask_otps_proxy function| ask_cc_proxy function| ask_yesno_proxy function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond string| bid object| php_js object| CORE__ object| REST_FN__ object| loader_ number| bidder_timer2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bnz-online.net/ | Name: real Value: OK |
|
bnz-online.net/9da4781ce857cb6fcecc7fb304662bc7 | Name: bid Value: 9da4781ce857cb6fcecc7fb304662bc7 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bnz-online.net
146.0.76.67
00597164b7643a1a0040f59fe7167231ba550754b16f0c7df456d7490698ba11
05bb0d8dc2e21c3e80619698d0e02832648ccb2ed74bf976d0d49df9388abe80
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
15a25fdc6bed84de532ad817d1e824ede39f2354b5ffb55e4829d39b0f394344
1df01b5d79b6cc383a39c89139179b76e2b02d4a9b8f46bba89b10c844406a1f
25f1028ab83ced059823685b557d4c4be3bae2cc31095f71c12b8752cecdf874
4799bef1e32d9c93204edea971ed9c5658a503e96c7d21c9dd873c01d36501c3
68f61f622c0fd869cdc0426f0e8379ab6f18e728117b95708b60807d3648af0f
6edafe0594b96053bf2d74c07cffab624a961306a28d890047a1e831ab0f9157
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
82a748e962d942166343062c1adaadb7301ac6cd34a257e045f1bbce16ac02c1
86bafbd7207dac22cf4e37b464a05da108075e85a6502f76ddfb91b06198bc1e
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
9e63cdc77de3df5b0b0685849e03d263716a22ccf56e4ed74807504dc227221c
ad5e9916e9da30de66893797b07011a2e5100f472b7deb996fa5d4c04e779b49
b9684b7fe84d01826fd70c3c1e0b11ab03ee07825998aac2b9270e04f46d56ee
da20a299178b5f6967512a2bb82001764a163866cef570c8953470a7fa157d89
dc5687b50f70cb95379bfced5a0eae768dd4382cd6b393ee77d65bbdd6373fbf
f7378db300aaa1e28a188500618d7b0849504a37c58c622d14ac2b09662f1507