www.fit-in.net
Open in
urlscan Pro
173.199.160.52
Malicious Activity!
Public Scan
Submission: On May 21 via automatic, source openphish
Summary
This is the only time www.fit-in.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 173.199.160.52 173.199.160.52 | 19066 (WIREDTREE) (WIREDTREE - Cogswell Enterprises Inc.) | |
15 | 2 |
ASN19066 (WIREDTREE - Cogswell Enterprises Inc., US)
PTR: eagle.myhostingservice.net
www.fit-in.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
fit-in.net
www.fit-in.net |
197 KB |
0 |
bankofamerica.com
Failed
chat.bankofamerica.com Failed |
|
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | www.fit-in.net |
www.fit-in.net
|
0 | chat.bankofamerica.com Failed |
www.fit-in.net
|
15 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bankofamerica.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.fit-in.net/wp-includes/ID3/home/auth/Challenge.php
Frame ID: 21076.1
Requests: 15 HTTP requests in this frame
2 Outgoing links
These are links going to different origins than the main page.
Title: Privacy & Security
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Challenge.php
www.fit-in.net/wp-includes/ID3/home/auth/ |
22 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.css
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
90 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.css
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
184 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.js
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
270 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.js
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
328 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
deploy2.js
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mTag.js
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
17 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bac_reg_logo_tmp_250X69.gif
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.jpg
www.fit-in.net/wp-includes/ID3/home/auth/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtagconfig.js
www.fit-in.net/wp-includes/ID3/home/auth/files/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
www.fit-in.net/pa/components/modules/header-module/2.1/graphic/ |
390 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb-static-sprite.png
www.fit-in.net/pa/components/modules/global-footer-module/2.5/graphic/ |
396 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home-icon.png
www.fit-in.net/pa/components/modules/global-footer-module/2.5/graphic/ |
391 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-arrows.png
www.fit-in.net/pa/components/modules/quick-help-module/2.0/graphic/ |
383 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
deploy2.asp
chat.bankofamerica.com/visitor/addons/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- chat.bankofamerica.com
- URL
- http://chat.bankofamerica.com/visitor/addons/deploy2.asp?site=LPBofA2&d_id=olb-passcode-english&default=simpleDeploy
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
chat.bankofamerica.com
www.fit-in.net
chat.bankofamerica.com
173.199.160.52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