brightpaks.in
Open in
urlscan Pro
103.14.99.114
Malicious Activity!
Public Scan
Submission: On November 22 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on September 15th 2022. Valid for: 3 months.
This is the only time brightpaks.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 103.14.99.114 103.14.99.114 | 58641 (TRUNKOZ-I...) (TRUNKOZ-IN Trunkoz Technologies Pvt Ltd) | |
13 | 1 |
ASN58641 (TRUNKOZ-IN Trunkoz Technologies Pvt Ltd, IN)
PTR: 114.99.trunkoz.com
brightpaks.in |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
brightpaks.in
brightpaks.in |
735 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | brightpaks.in |
brightpaks.in
|
13 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
brightpaks.in cPanel, Inc. Certification Authority |
2022-09-15 - 2022-12-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://brightpaks.in/BOA/otp2.html
Frame ID: 547C8BFE352B70E4D6C3C544F0DEB07B
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
otp2.html
brightpaks.in/BOA/ |
346 KB 346 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bactouch.css
brightpaks.in/BOA/images/ |
158 KB 158 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mask.js
brightpaks.in/BOA/images/ |
146 KB 146 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-logos-BofA_rgb-CSX5624a146.svg
brightpaks.in/BOA/images/ |
3 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-site-secure-ah-forgot-common-BofA_symbol_rgb-CSX33067442.svg
brightpaks.in/BOA/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-site-secure-ah-forgot-common-loader_black-CSX85ecad56.gif
brightpaks.in/BOA/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secure_lock.png
brightpaks.in/BOA/images/ |
352 B 593 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-header-lock-CSX1f35fd71.png
brightpaks.in/BOA/images/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-footer-eha_logo_1x-CSXc5bd9130.png
brightpaks.in/BOA/images/ |
343 B 585 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-header-secure-lock-CSXa09bf5fc.svg
brightpaks.in/BOA/images/ |
353 B 599 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
assets-images-global-title-flagscape_red-CSX345e7fd7.svg
brightpaks.in/BOA/images/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.woff2
brightpaks.in/BOA/ |
11 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-medium.woff2
brightpaks.in/BOA/ |
12 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| IMask object| element object| maskOptions object| mask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
brightpaks.in
103.14.99.114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