ptstrainingcourses.com
Open in
urlscan Pro
2606:4700:30::681b:b7ca
Malicious Activity!
Public Scan
Submission: On April 18 via automatic, source phishtank
Summary
This is the only time ptstrainingcourses.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 2606:4700:30:... 2606:4700:30::681b:b7ca | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2606:4700:30:... 2606:4700:30::681b:b6ca | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 69.89.31.230 69.89.31.230 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
7 | 5 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
ptstrainingcourses.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
ptstrainingcourses.com |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: box430.bluehost.com
smallenvelop.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ptstrainingcourses.com
ptstrainingcourses.com |
53 KB |
1 |
smallenvelop.com
smallenvelop.com |
367 B |
1 |
googleapis.com
ajax.googleapis.com |
29 KB |
0 |
bankofamerica.com
Failed
www.bankofamerica.com Failed |
|
7 | 4 |
Domain | Requested by | |
---|---|---|
4 | ptstrainingcourses.com |
ptstrainingcourses.com
|
1 | smallenvelop.com |
ptstrainingcourses.com
|
1 | ajax.googleapis.com |
ptstrainingcourses.com
|
0 | www.bankofamerica.com Failed | |
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2019-03-01 - 2019-05-24 |
3 months | crt.sh |
smallenvelop.com Let's Encrypt Authority X3 |
2019-02-19 - 2019-05-20 |
3 months | crt.sh |
This page contains 1 frames:
Frame:
https://www.bankofamerica.com/
Frame ID: 00A986DEA525DC06868BA0D1001BC267
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
surf3.php
ptstrainingcourses.com/wp-content/plugins/wp-pack/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
m4.png
ptstrainingcourses.com/wp-content/plugins/wp-pack/images/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
m5.png
ptstrainingcourses.com/wp-content/plugins/wp-pack/images/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wait.gif
ptstrainingcourses.com/wp-content/plugins/wp-pack/images/ |
24 KB 24 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Preloader_11.gif
smallenvelop.com/wp-content/uploads/2014/08/ |
0 367 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
www.bankofamerica.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.bankofamerica.com
- URL
- https://www.bankofamerica.com/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
ptstrainingcourses.com
smallenvelop.com
www.bankofamerica.com
www.bankofamerica.com
2606:4700:30::681b:b6ca
2606:4700:30::681b:b7ca
2a00:1450:4001:80b::200a
69.89.31.230
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
3adc50bb425af67f81596b34784467e5bf5f57104434fea7d07e180202cd9017
84728f8e6a79866da90779d7c77533f5e107afb9fa17ef3a6dc409be65a46f0d
b232977f6ccdd5ffc39d20bb254494a658aeb79ec0cb9c7de86616e7f39fdd24
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
fd0fb07586d3f3f5cda85c9d47104232a3c6f81f961040bd386b358ffbf1bde0