www.cktavsiye.com Open in urlscan Pro
149.202.205.16  Malicious Activity! Public Scan

URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challenge...
Submission: On August 12 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 149.202.205.16, located in France and belongs to OVH, FR. The main domain is www.cktavsiye.com.
This is the only time www.cktavsiye.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
5 149.202.205.16 16276 (OVH)
5 1
Apex Domain
Subdomains
Transfer
5 cktavsiye.com
www.cktavsiye.com
134 KB
5 1
Domain Requested by
5 www.cktavsiye.com www.cktavsiye.com
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
Frame ID: 24018.1
Requests: 5 HTTP requests in this frame

Screenshot


Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

134 kB
Transfer

134 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request challengevdl.php
www.cktavsiye.com/bank_of_america/bofa/a689ca72/
13 KB
13 KB
Document
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
514a35757d4c2cf01cb73259d9855b917b59d87792acb479b3868fa1a8fda343

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:26 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style1.css
www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/
3 KB
3 KB
Stylesheet
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/style1.css
Requested by
Host: www.cktavsiye.com
URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
94f243198ac37ef309f89bf03a8faf0c93c1c5a45a39f46c1ca7491306b0ac68

Request headers

Referer
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:26 GMT
Last-Modified
Fri, 11 Aug 2017 21:55:59 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
3415
new%20header.png
www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/
104 KB
104 KB
Image
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/new%20header.png
Requested by
Host: www.cktavsiye.com
URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
1dbaa336651d898b99626cd80ec5f2ca9b0971429d6e0d9c20bead1322c362c7

Request headers

Referer
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:26 GMT
Last-Modified
Fri, 11 Aug 2017 21:55:59 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
106895
confirm.png
www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/
2 KB
2 KB
Image
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/confirm.png
Requested by
Host: www.cktavsiye.com
URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
3bd5ac9684632300424ca98cbe5c5ee9af57d20ba97ced23899daf5ea9bd6685

Request headers

Referer
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:26 GMT
Last-Modified
Fri, 11 Aug 2017 21:55:59 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
2154
footer.png
www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/
11 KB
11 KB
Image
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/footer.png
Requested by
Host: www.cktavsiye.com
URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
28b7d265d56813fc5fbe7201db185a3eb4ddfcca697b34775338e2ede6e426ca

Request headers

Referer
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/challengevdl.php?tm&aof=79212b72cea2ad685e549550311d8bb5&challengesession=719b3fef70923165ff85262c16ea104a04c3fab9
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:26 GMT
Last-Modified
Fri, 11 Aug 2017 21:55:59 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
10902

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies