opelzielonagora.pl
Open in
urlscan Pro
94.152.156.62
Malicious Activity!
Public Scan
Submission: On February 01 via automatic, source openphish
Summary
This is the only time opelzielonagora.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 94.152.156.62 94.152.156.62 | 29522 (KEI ) (KEI ) | |
1 | 2a00:1288:12c... 2a00:1288:12c:2::4001 | 15635 (YAHOO-UKL ) (YAHOO-UKL ) | |
7 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
opelzielonagora.pl
opelzielonagora.pl |
37 KB |
1 |
yahooapis.com
yui.yahooapis.com |
4 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | opelzielonagora.pl |
opelzielonagora.pl
|
1 | yui.yahooapis.com |
opelzielonagora.pl
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/confirm.php
Frame ID: 3043.1
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
confirm.php
opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/ |
20 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pure-min.css
yui.yahooapis.com/pure/0.6.0/ |
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2header.png
opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/images/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
persona.png
opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
confirm.png
opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2footer.png
opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/images/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
opelzielonagora.pl/logs/bofa/10762897b10f268cafe7c8f9db08a2ba/images/ |
318 B 193 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
opelzielonagora.pl
yui.yahooapis.com
2a00:1288:12c:2::4001
94.152.156.62
00e83aa5f667c4ee219411f6cf6ba69a0746294f1753dba050f93259a48c2747
0d86f19516d2dba37842994c91ca11537de4a788ead9dfffe48daa507abf4f41
20a2bdb32c63808e560b631d34a00f607a2010658af9891237f7096fc75958db
3bd5ac9684632300424ca98cbe5c5ee9af57d20ba97ced23899daf5ea9bd6685
5bfe49a55a18ab7f02ac80a3ae8b900ffc232376c132f94a510c0cc8860126fb
97ac0743dec6f7dc9326192d642ae23bfbd0afc3601cc192462c6eb6f5ec1224
9bf8559c32f3f8a9691f1a723102bca3ace6c2b27288b1f43881e4b8a89eaf58