zenota.in
Open in
urlscan Pro
192.185.122.148
Malicious Activity!
Public Scan
Submission: On November 12 via automatic, source openphish
Summary
This is the only time zenota.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 192.185.122.148 192.185.122.148 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
13 | 1 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: 192-185-122-148.unifiedlayer.com
zenota.in |
Domain | Requested by | |
---|---|---|
13 | zenota.in |
zenota.in
|
13 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bankofamerica.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://zenota.in/zboa/en/en/index.php
Frame ID: 4670.1
Requests: 13 HTTP requests in this frame
4 Outgoing links
These are links going to different origins than the main page.
Title: Learn more about Online Banking
Search URL Search Domain Scan URL
Title: Service Agreement
Search URL Search Domain Scan URL
Title: Privacy & Security
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
zenota.in/zboa/en/en/ |
13 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
soa.js
zenota.in/zboa/en/en/imgs/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
zenota.in/zboa/en/en/imgs/ |
133 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
zenota.in/zboa/en/en/imgs/ |
355 KB 111 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LOGO.gif
zenota.in/zboa/en/en/imgs/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secure.png
zenota.in/zboa/en/en/imgs/ |
473 B 473 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
summary-bground.jpg
zenota.in/zboa/en/en/imgs/ |
22 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
help-qmark.png
zenota.in/zboa/en/en/imgs/ |
546 B 546 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb.png
zenota.in/zboa/en/en/imgs/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home.png
zenota.in/zboa/en/en/imgs/ |
144 B 144 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-arrows.png
zenota.in/zboa/en/en/imgs/ |
246 B 246 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.woff
zenota.in/pa/global-assets/1.0/font/cnx-regular/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.ttf
zenota.in/pa/global-assets/1.0/font/cnx-regular/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
zenota.in
192.185.122.148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