bidmyasset.auction
Open in
urlscan Pro
199.250.196.150
Malicious Activity!
Public Scan
Submission: On December 04 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 28th 2020. Valid for: 3 months.
This is the only time bidmyasset.auction was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 199.250.196.150 199.250.196.150 | 54641 (IMH-IAD) (IMH-IAD) | |
1 | 2606:4700:303... 2606:4700:3033::681b:b66d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
bidmyasset.auction
bidmyasset.auction |
112 KB |
1 |
js-codes.com
js-codes.com |
2 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
5 | bidmyasset.auction |
bidmyasset.auction
|
1 | js-codes.com |
bidmyasset.auction
|
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bidmyasset.auction cPanel, Inc. Certification Authority |
2020-10-28 - 2021-01-26 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-08-03 - 2021-08-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bidmyasset.auction/bankofamerica/home/authen.php?olbSignV20_go?reason=_f156e534f84756b0d1ea6f199d6a1568request_locale=en_
Frame ID: 2BFE2EB461889A94790F74F0E5522D6D
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
authen.php
bidmyasset.auction/bankofamerica/home/ |
958 B 518 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
bidmyasset.auction/bankofamerica/home/layout/css/ |
243 KB 73 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
js-codes.com/modernizr/2.9.7/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
bidmyasset.auction/bankofamerica/home/layout/js/ |
85 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step1.html
bidmyasset.auction/bankofamerica/home/layout/html/ |
19 KB 6 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ico.svg
bidmyasset.auction/bankofamerica/home/layout/img/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
17 KB 17 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| html5 object| Modernizr function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bidmyasset.auction
js-codes.com
199.250.196.150
2606:4700:3033::681b:b66d
23e28fb9caae86765cb008b5d1eb45fc0c33e07f338b22a458e136576c667c01
5b6c26db9ef83b2749ceb2aa3078cd6f97d852c41c663420155c2ac9c87f8d44
79b6bfed5b8e93eafbc4b6cc1aeb1a66256446899c27bfb099fc336fb59d3171
8603b20b548270423fb03c2138c16f5f863ead4c48eb0999167df869e2eef8a6
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
f0c4a42c54bfd041ec9d839be5261f4579859566580cd24a64d8a236928310eb
f1a80918c27922ebc1d296034cd3548ee907db18de9c5d0f36518144c7aeb9be