glintandco.com
Open in
urlscan Pro
51.79.143.236
Malicious Activity!
Public Scan
Submission: On July 13 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 10th 2019. Valid for: 3 months.
This is the only time glintandco.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 51.79.143.236 51.79.143.236 | 16276 (OVH) (OVH) | |
1 | 2606:4700::68... 2606:4700::6813:c497 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 54.83.184.182 54.83.184.182 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
16 | 4 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-54-83-184-182.compute-1.amazonaws.com
dull.bankofamerica.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
glintandco.com
glintandco.com |
99 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
3 KB |
1 |
bankofamerica.com
secure.bankofamerica.com Failed aero.bankofamerica.com Failed boss.bankofamerica.com Failed dull.bankofamerica.com |
20 KB |
16 | 3 |
Domain | Requested by | |
---|---|---|
9 | glintandco.com |
glintandco.com
|
1 | dull.bankofamerica.com |
glintandco.com
|
1 | cdnjs.cloudflare.com |
glintandco.com
|
0 | boss.bankofamerica.com Failed |
glintandco.com
|
0 | aero.bankofamerica.com Failed |
glintandco.com
|
0 | secure.bankofamerica.com Failed |
glintandco.com
|
16 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glintandco.com cPanel, Inc. Certification Authority |
2019-07-10 - 2019-10-08 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-03-02 - 2019-09-08 |
6 months | crt.sh |
dull.bankofamerica.com Entrust Certification Authority - L1M |
2018-12-13 - 2019-12-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/info.php
Frame ID: CF3BF2AB6C393B407BEFB35111C091A9
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
info.php
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/ |
20 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.css
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
vipaa-v2-jawr.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bac_reg_logo_tmp_250X69.gif
secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
23.png
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
vipaa-v2-jawr-print.css
secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sec.png
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
so.png
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/images/ |
210 B 451 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.1.0.min.js
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footercc.png
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/ |
69 KB 69 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
I3n.js
aero.bankofamerica.com/30306/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
a8e.js
boss.bankofamerica.com/30306/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
y9h.js
dull.bankofamerica.com/boaa/ |
48 KB 20 KB |
XHR
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cc.png
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ccc.png
glintandco.com/support/user.bank/d48780217fd88ed629a005be09987167/images/ |
914 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- secure.bankofamerica.com
- URL
- https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/vipaa-v2-jawr.css
- Domain
- secure.bankofamerica.com
- URL
- https://secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/bac_reg_logo_tmp_250X69.gif
- Domain
- secure.bankofamerica.com
- URL
- https://secure.bankofamerica.com/pa/components/bundles/gzip-compressed/xengine/VIPAA/4.2.1/style/vipaa-v2-jawr-print.css
- Domain
- aero.bankofamerica.com
- URL
- https://aero.bankofamerica.com/30306/I3n.js
- Domain
- boss.bankofamerica.com
- URL
- https://boss.bankofamerica.com/30306/a8e.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| getSCookie function| get_SessionIdString object| boaPageDataJS object| theBody object| ___so30306 number| CLIWHIT string| PSESSIONID string| SSESSIONID object| regex object| match string| LSESSIONID object| __tp number| __gt0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aero.bankofamerica.com
boss.bankofamerica.com
cdnjs.cloudflare.com
dull.bankofamerica.com
glintandco.com
secure.bankofamerica.com
aero.bankofamerica.com
boss.bankofamerica.com
secure.bankofamerica.com
2606:4700::6813:c497
51.79.143.236
54.83.184.182
0186fa7397638f15e5c2df0fbd80fe5bccca34b38685e4ef3e91c63a80ae2067
0188cce4f712d706ec74b251fcc60acc522e812f0dbfbe6e8283ad1ed2b3469c
4dcb71ec4d58fb6cec31a1fb68e3c734af9695dc89baebe412d7b39a0a4b66c9
7abafea4f63be2240874b7cb01802e270f909367543204e982486a2a3082e6c5
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020
84c0a27c006557c98305dcaa1378a976a9bc8e26786346a1be0ef7eed48dd993
89afab554686eff813ff2c5c6ebbb18c428ecaecc4ba1394b67c98403a24fac1
8f0aa8e4629d74b6e01a62bd8ac0a23ff05a0342ca333363897cde426147bf89
a7ce5763afec1aa9459b2d2d18068a946f1097807556e34a8f5b0297cbff5dc5