![](/screenshots/cdebb3e3-3e6f-476a-8e5a-ed90c919f69e.png)
139.59.192.191
Open in
urlscan Pro
139.59.192.191
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On June 27 via api from GB
Summary
This is the only time 139.59.192.191 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Scotiabank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 139.59.192.191 139.59.192.191 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
10 | 1 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
139.59.192.191 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 | 0 |
Domain | Requested by | |
---|---|---|
10 | 0 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.scotiaonline.scotiabank.com |
maps.scotiabank.com |
mobilebanking.scotiabank.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://139.59.192.191/scotia/mfaAuth.html
Frame ID: 6160B053C9438C49580FD6BED3FDE41A
Requests: 10 HTTP requests in this frame
Screenshot
![](/screenshots/cdebb3e3-3e6f-476a-8e5a-ed90c919f69e.png)
Detected technologies
![](/vendor/wappa/icons/Debian.png)
Detected patterns
- headers server /Debian/i
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Title: Locate Us
Search URL Search Domain Scan URL
Title: Mobile Site
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
mfaAuth.html
139.59.192.191/scotia/ |
18 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
framework.pack.js.download
139.59.192.191/scotia/mfaAuth_files/ |
57 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.css
139.59.192.191/scotia/mfaAuth_files/ |
379 KB 64 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.8.2.custom.css
139.59.192.191/scotia/mfaAuth_files/ |
10 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bns-jquery-1.4.2.js.download
139.59.192.191/scotia/mfaAuth_files/ |
314 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scotiabank-group-bw.gif
139.59.192.191/scotia/mfaAuth_files/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
log.png
139.59.192.191/scotia/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nav-bg.png
139.59.192.191/scotia/images/nav/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
scotiabank-group.gif
139.59.192.191/scotia/images/branding/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_vertical_dotted_line1.png
139.59.192.191/scotia/images/backgrounds/ |
77 B 359 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Scotiabank (Banking)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| Sarissa undefined| x undefined| _SARISSA_DOM_PROGID undefined| _SARISSA_XMLHTTP_PROGID undefined| _SARISSA_DOM_XMLWRITER undefined| importTable function| _JSFFormSubmit function| _clearJSFFormParameters function| clearFormHiddenParams object| A4J function| _sarissa_XMLDocument_onload object| LOG object| RichFaces function| $ function| jQuery function| DP_jQuery_1561619318620 function| clear_helpCentre_curtainMenuControls_helpform function| clearFormHiddenParams_helpCentre_curtainMenuControls_helpform function| clear_helpCentre_curtainMenuControls_contactform function| clearFormHiddenParams_helpCentre_curtainMenuControls_contactform0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
139.59.192.191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