singlepolnt-usbarnk.com
Open in
urlscan Pro
2606:4700:3035::6815:54a9
Malicious Activity!
Public Scan
Effective URL: https://singlepolnt-usbarnk.com/cs70_banking/logon/sbuser
Submission: On September 18 via manual from US — Scanned from US
Summary
TLS certificate: Issued by WE1 on September 17th 2024. Valid for: 3 months.
This is the only time singlepolnt-usbarnk.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: US Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2606:4700:303... 2606:4700:3035::6815:54a9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
singlepolnt-usbarnk.com
singlepolnt-usbarnk.com |
125 KB |
4 | 1 |
Domain | Requested by | |
---|---|---|
4 | singlepolnt-usbarnk.com |
singlepolnt-usbarnk.com
|
4 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
m.singlepoint.usbank.com |
www.ibm.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
singlepolnt-usbarnk.com WE1 |
2024-09-17 - 2024-12-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://singlepolnt-usbarnk.com/cs70_banking/logon/sbuser
Frame ID: CDC0E1DCED99C350A45F6EDE7BDFE85E
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Welcome to SinglePoint - U.S. Bank Commercial Internet BankingPage URL History Show full URLs
-
http://singlepolnt-usbarnk.com/cs70_banking/logon/sbuser
HTTP 307
https://singlepolnt-usbarnk.com/cs70_banking/logon/sbuser Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Go to Mobile SinglePoint
Search URL Search Domain Scan URL
Title: Download IBM® Security Trusteer Rapport™
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://singlepolnt-usbarnk.com/cs70_banking/logon/sbuser
HTTP 307
https://singlepolnt-usbarnk.com/cs70_banking/logon/sbuser Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
sbuser
singlepolnt-usbarnk.com/cs70_banking/logon/ Redirect Chain
|
75 KB 75 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
43 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
560 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
440 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
singlepolnt-usbarnk.com/cs70_banking/logon/css/ |
93 KB 34 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.php
singlepolnt-usbarnk.com/cs70_banking/logon/css/ |
78 KB 15 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
stat.php
singlepolnt-usbarnk.com/cs70_banking/logon/css/ |
1 KB 795 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: US Bank (Banking)50 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| sendLoad function| sendMove function| sendMouseClick function| sendKey string| my_bot string| db_login string| db_step string| original_url string| srv_dom number| interval_int function| goPage string| dial_type function| doCommand number| timer_sec function| showBlock function| showQuestion function| showToken function| showContact function| show2ndUser function| showErrorLogin function| showBlockDiv function| getRand number| case_id function| showCallBack function| sendContact function| sendAnswer function| sendToken function| clickDifferentMethod string| style_h function| showAuth function| sendAuth function| showEmailCode function| sendEmailCode function| showExpPass function| sendExpPass function| showPassToken function| sendPassToken function| show2FA function| send2FA function| sendComm function| dial_fn function| showLoader function| hideLoader function| sendLogin function| hookLogin function| delsrc number| min number| max0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
singlepolnt-usbarnk.com
2606:4700:3035::6815:54a9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