bidmyasset.auction Open in urlscan Pro
199.250.196.150  Malicious Activity! Public Scan

URL: https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_loca...
Submission: On December 04 via automatic, source openphish

Summary

This website contacted 3 IPs in 1 countries across 2 domains to perform 6 HTTP transactions. The main IP is 199.250.196.150, located in Los Angeles, United States and belongs to IMH-IAD, US. The main domain is bidmyasset.auction.
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 28th 2020. Valid for: 3 months.
This is the only time bidmyasset.auction was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
5 199.250.196.150 54641 (IMH-IAD)
1 2606:4700:303... 13335 (CLOUDFLAR...)
6 3
Apex Domain
Subdomains
Transfer
5 bidmyasset.auction
bidmyasset.auction
112 KB
1 js-codes.com
js-codes.com
2 KB
6 2
Domain Requested by
5 bidmyasset.auction bidmyasset.auction
1 js-codes.com bidmyasset.auction
6 2

This site contains no links.

Subject Issuer Validity Valid
bidmyasset.auction
cPanel, Inc. Certification Authority
2020-10-28 -
2021-01-26
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-08-03 -
2021-08-03
a year crt.sh

This page contains 1 frames:

Primary Page: https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
Frame ID: 2BFE2EB461889A94790F74F0E5522D6D
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

6
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

1
Countries

131 kB
Transfer

371 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request authen.php
bidmyasset.auction/bankofamerica/home/
958 B
518 B
Document
General
Full URL
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
199.250.196.150 Los Angeles, United States, ASN54641 (IMH-IAD, US),
Reverse DNS
Software
nginx/1.19.3 /
Resource Hash
5b6c26db9ef83b2749ceb2aa3078cd6f97d852c41c663420155c2ac9c87f8d44

Request headers

:method
GET
:authority
bidmyasset.auction
:scheme
https
:path
/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

server
nginx/1.19.3
date
Fri, 04 Dec 2020 01:56:18 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
x-proxy-cache
DISABLED
content-encoding
br
main.css
bidmyasset.auction/bankofamerica/home/layout/css/
243 KB
73 KB
Stylesheet
General
Full URL
https://bidmyasset.auction/bankofamerica/home/layout/css/main.css
Requested by
Host: bidmyasset.auction
URL: https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
199.250.196.150 Los Angeles, United States, ASN54641 (IMH-IAD, US),
Reverse DNS
Software
nginx/1.19.3 /
Resource Hash
f1a80918c27922ebc1d296034cd3548ee907db18de9c5d0f36518144c7aeb9be

Request headers

Referer
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 04 Dec 2020 01:56:19 GMT
content-encoding
br
last-modified
Mon, 21 Jan 2019 14:12:52 GMT
server
nginx/1.19.3
etag
W/"5c45d364-3cb9f"
vary
Accept-Encoding
content-type
text/css
expires
Fri, 11 Dec 2020 01:56:19 GMT
cache-control
max-age=604800, public, must-revalidate
x-proxy-cache
STATIC/TYPE
modernizr.min.js
js-codes.com/modernizr/2.9.7/
4 KB
2 KB
Script
General
Full URL
https://js-codes.com/modernizr/2.9.7/modernizr.min.js
Requested by
Host: bidmyasset.auction
URL: https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::681b:b66d , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / Express, Phusion Passenger 5.3.7
Resource Hash
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44

Request headers

Referer
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 04 Dec 2020 01:56:19 GMT
content-encoding
br
cf-cache-status
MISS
nel
{"report_to":"cf-nel","max_age":604800}
x-powered-by
Express, Phusion Passenger 5.3.7
status
200 OK
cf-request-id
06cd0ff5b90000c2dbc9a58000000001
last-modified
Wed, 11 Oct 2017 07:04:24 GMT
server
cloudflare
etag
W/"edf-15f0a3fa4c0"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=zC%2F6MgH%2BaRu8VKQMbGC3yRjQtuamzW28qZSOnAJfAQXERASgD%2Fjt%2BSvVpzC0d0u4o%2FZ83jYXo1aIqqMYSUjGj9jFRw50u8dfwOvp0qX%2BMBO28JkoeBsyvHc%3D"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=UTF-8
cache-control
public, max-age=31536000
cf-ray
5fc1e902ca1fc2db-FRA
expires
Sat, 04 Dec 2021 01:56:19 GMT
jquery.js
bidmyasset.auction/bankofamerica/home/layout/js/
85 KB
31 KB
Script
General
Full URL
https://bidmyasset.auction/bankofamerica/home/layout/js/jquery.js
Requested by
Host: bidmyasset.auction
URL: https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
199.250.196.150 Los Angeles, United States, ASN54641 (IMH-IAD, US),
Reverse DNS
Software
nginx/1.19.3 /
Resource Hash
8603b20b548270423fb03c2138c16f5f863ead4c48eb0999167df869e2eef8a6

Request headers

Referer
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 04 Dec 2020 01:56:19 GMT
content-encoding
br
last-modified
Mon, 21 Jan 2019 14:12:52 GMT
server
nginx/1.19.3
etag
W/"5c45d364-15339"
vary
Accept-Encoding
content-type
application/javascript
expires
Fri, 11 Dec 2020 01:56:19 GMT
cache-control
max-age=604800, public, must-revalidate
x-proxy-cache
STATIC/TYPE
step1.html
bidmyasset.auction/bankofamerica/home/layout/html/
19 KB
6 KB
XHR
General
Full URL
https://bidmyasset.auction/bankofamerica/home/layout/html/step1.html
Requested by
Host: bidmyasset.auction
URL: https://bidmyasset.auction/bankofamerica/home/layout/js/jquery.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
199.250.196.150 Los Angeles, United States, ASN54641 (IMH-IAD, US),
Reverse DNS
Software
nginx/1.19.3 /
Resource Hash
f0c4a42c54bfd041ec9d839be5261f4579859566580cd24a64d8a236928310eb

Request headers

Accept
*/*
Referer
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 04 Dec 2020 01:56:19 GMT
content-encoding
br
last-modified
Mon, 04 May 2020 14:00:02 GMT
server
nginx/1.19.3
content-type
text/html
vary
Accept-Encoding
x-proxy-cache
DISABLED
ico.svg
bidmyasset.auction/bankofamerica/home/layout/img/
2 KB
2 KB
Image
General
Full URL
https://bidmyasset.auction/bankofamerica/home/layout/img/ico.svg
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
199.250.196.150 Los Angeles, United States, ASN54641 (IMH-IAD, US),
Reverse DNS
Software
nginx/1.19.3 /
Resource Hash
23e28fb9caae86765cb008b5d1eb45fc0c33e07f338b22a458e136576c667c01

Request headers

Referer
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 04 Dec 2020 01:56:19 GMT
last-modified
Mon, 21 Jan 2019 14:12:52 GMT
server
nginx/1.19.3
etag
"5c45d364-644"
content-type
image/svg+xml
expires
Fri, 11 Dec 2020 01:56:19 GMT
cache-control
max-age=604800, public, must-revalidate
accept-ranges
bytes
content-length
1604
x-proxy-cache
STATIC/TYPE
truncated
/
17 KB
17 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
79b6bfed5b8e93eafbc4b6cc1aeb1a66256446899c27bfb099fc336fb59d3171

Request headers

Origin
https://bidmyasset.auction
Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
application/font-woff2;charset=utf-8

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| html5 object| Modernizr function| $ function| jQuery

0 Cookies