![](/screenshots/92936c7b-715b-4012-848a-52c4c91331c6.png)
www.bnz.nz.bnzn.icu
Open in
urlscan Pro
176.105.255.53
Malicious Activity!
Public Scan
Effective URL: https://www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/biz_login/
Submission: On January 22 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on January 20th 2019. Valid for: 3 months.
This is the only time www.bnz.nz.bnzn.icu was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BNZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 17 | 176.105.255.53 176.105.255.53 | 62068 (SPECTRAIP) (SPECTRAIP) | |
15 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
bnzn.icu
2 redirects
www.bnz.nz.bnzn.icu |
217 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
17 | www.bnz.nz.bnzn.icu |
2 redirects
www.bnz.nz.bnzn.icu
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.bnz.nz.bnzn.icu Let's Encrypt Authority X3 |
2019-01-20 - 2019-04-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/biz_login/
Frame ID: C99DB1B97D8B04D96F6E45E14C4E6F8E
Requests: 15 HTTP requests in this frame
Screenshot
![](/screenshots/92936c7b-715b-4012-848a-52c4c91331c6.png)
Page URL History Show full URLs
- https://www.bnz.nz.bnzn.icu/home3971/bnznu/home.php Page URL
-
https://www.bnz.nz.bnzn.icu/home3971/bnznu/24cacf7dbe0336f8c92253feaa5510d5
HTTP 301
https://www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/ HTTP 302
https://www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/biz_login/ Page URL
Detected technologies
Detected patterns
- url /\.php(?:$|\?)/i
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- html /<link[^>]* href=[^>]+font-awesome(?:\.min)?\.css/i
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.bnz.nz.bnzn.icu/home3971/bnznu/home.php Page URL
-
https://www.bnz.nz.bnzn.icu/home3971/bnznu/24cacf7dbe0336f8c92253feaa5510d5
HTTP 301
https://www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/ HTTP 302
https://www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/biz_login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
![]() www.bnz.nz.bnzn.icu/home3971/bnznu/ |
687 B 672 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5/biz_login/ Redirect Chain
|
14 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.bnz.nz.bnzn.icu/bnznu/bower_components/jquery/dist/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
www.bnz.nz.bnzn.icu/bnznu/bower_components/ua-parser-js/dist/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
www.bnz.nz.bnzn.icu/bnznu/bower_components/font-awesome/css/ |
30 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
www.bnz.nz.bnzn.icu/bnznu/core/form/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
www.bnz.nz.bnzn.icu/bnznu/core/form/ |
123 B 430 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
www.bnz.nz.bnzn.icu/bnznu/biz_login/form/ |
358 B 666 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
www.bnz.nz.bnzn.icu/bnznu/biz_login/ |
19 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo1.png
www.bnz.nz.bnzn.icu/bnznu/biz_login/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout.png
www.bnz.nz.bnzn.icu/bnznu/biz_login/ |
70 B 377 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logout_001.png
www.bnz.nz.bnzn.icu/bnznu/biz_login/ |
70 B 377 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
www.bnz.nz.bnzn.icu/bnznu/biz_login/form/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serranoweb-regular.woff2
www.bnz.nz.bnzn.icu/bnznu/biz_login/ |
19 KB 19 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
serranoweb-bold.woff2
www.bnz.nz.bnzn.icu/bnznu/biz_login/ |
21 KB 21 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BNZ Bank (Banking)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| UAParser function| next__ function| finish__ object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| ask_def_proxy function| ask_login_proxy function| ask_biz_login_proxy function| ask_pers_token_proxy function| send1 string| bid object| php_js object| loader_1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.bnz.nz.bnzn.icu/bnznu/24cacf7dbe0336f8c92253feaa5510d5 | Name: bid Value: 24cacf7dbe0336f8c92253feaa5510d5 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.bnz.nz.bnzn.icu
176.105.255.53
00597164b7643a1a0040f59fe7167231ba550754b16f0c7df456d7490698ba11
0fda30cf243e7650bf3e1666eddeb4fbba6b788ede36753eda5e2964cc14c896
1df01b5d79b6cc383a39c89139179b76e2b02d4a9b8f46bba89b10c844406a1f
25f1028ab83ced059823685b557d4c4be3bae2cc31095f71c12b8752cecdf874
4799bef1e32d9c93204edea971ed9c5658a503e96c7d21c9dd873c01d36501c3
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
89e333f73f162729c2830595e7a1cb14f6666b7b41497bae6d8100255bb89d09
906007cf93ff7ce64e661c126b9cfc218038202191de94f2d1275919dc197f25
9e63cdc77de3df5b0b0685849e03d263716a22ccf56e4ed74807504dc227221c
bda15ae763edcc6de5ea3e89c0b1fe762f1ac4246e2bee43b6ac2bd9060148c3
dc5687b50f70cb95379bfced5a0eae768dd4382cd6b393ee77d65bbdd6373fbf
ec6a20931d02bc4db8f88c1f118e2f22af2f7045a3221d93a350f66c02bc9292
f7378db300aaa1e28a188500618d7b0849504a37c58c622d14ac2b09662f1507