www.prasanttghosh.com
Open in
urlscan Pro
192.185.155.225
Malicious Activity!
Public Scan
Submission: On October 02 via automatic, source openphish
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on August 9th 2018. Valid for: 3 months.
This is the only time www.prasanttghosh.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
18 | 192.185.155.225 192.185.155.225 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
18 | 1 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: 192-185-155-225.unifiedlayer.com
www.prasanttghosh.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
prasanttghosh.com
www.prasanttghosh.com |
114 KB |
18 | 1 |
Domain | Requested by | |
---|---|---|
18 | www.prasanttghosh.com |
www.prasanttghosh.com
|
18 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ml.com |
www.bofaml.com |
about.bankofamerica.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
prasanttghosh.com Let's Encrypt Authority X3 |
2018-08-09 - 2018-11-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.prasanttghosh.com/booff/secure-bankofamerica-personal-information-update.php
Frame ID: 8E452E734A42F7B53215B27B4097A514
Requests: 18 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
secure-bankofamerica-personal-information-update.php
www.prasanttghosh.com/booff/ |
16 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style1.css
www.prasanttghosh.com/booff/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
boa-header2.png
www.prasanttghosh.com/booff/img/ |
89 KB 90 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sb.png
www.prasanttghosh.com/booff/img/ |
936 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wm.png
www.prasanttghosh.com/booff/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bi.png
www.prasanttghosh.com/booff/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
about.png
www.prasanttghosh.com/booff/img/ |
699 B 915 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
profile.png
www.prasanttghosh.com/booff/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bp.png
www.prasanttghosh.com/booff/img/ |
770 B 986 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
transfer.png
www.prasanttghosh.com/booff/img/ |
889 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sod.png
www.prasanttghosh.com/booff/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ti.png
www.prasanttghosh.com/booff/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
oaa.png
www.prasanttghosh.com/booff/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hs.png
www.prasanttghosh.com/booff/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
up.png
www.prasanttghosh.com/booff/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sc.png
www.prasanttghosh.com/booff/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.png
www.prasanttghosh.com/booff/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
so.png
www.prasanttghosh.com/booff/img/ |
783 B 999 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.prasanttghosh.com
192.185.155.225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