freestyle.d934713.u-telcom.net
Open in
urlscan Pro
213.131.32.170
Malicious Activity!
Public Scan
Submission: On June 20 via automatic, source phishtank
Summary
This is the only time freestyle.d934713.u-telcom.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 213.131.32.170 213.131.32.170 | 15491 (SILKNET) (SILKNET) | |
16 | 1 |
ASN15491 (SILKNET, GE)
PTR: cpanel.u-telcom.net
freestyle.d934713.u-telcom.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
u-telcom.net
freestyle.d934713.u-telcom.net |
589 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
16 | freestyle.d934713.u-telcom.net |
freestyle.d934713.u-telcom.net
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/login.php?cmd=login_submit&id=54e7b2b6224c19839159454f9c58c99754e7b2b6224c19839159454f9c58c997&session=54e7b2b6224c19839159454f9c58c99754e7b2b6224c19839159454f9c58c997
Frame ID: 26462.1
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shape1570988843.gif
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
01.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
02.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
03.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
04.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
05.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
61 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
06.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
07.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
983 B 983 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
08.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
876 B 876 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signs.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
09.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
160 KB 160 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
010.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
31 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
011.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
012.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
237 KB 237 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.png
freestyle.d934713.u-telcom.net/Boa_Fud_2016/home/images/ |
44 KB 44 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
freestyle.d934713.u-telcom.net
213.131.32.170
26883fc461096502a0e05e8c407666eccb873180c99b992e57c5e03e3a9c1898
2a714301019308ff8fd2377254a7d6dd6f6890eadff9dad45e4e9fa8900b826d
2ad49e605216477cf3dafd5ab8926ed9e31161ef03f3635a8b69cf269279e013
3a68687f90e9d3f7cb695957c6df76c6093e9c5b4c2739cf8cffe50fb94e8e9a
435a5d9b2216fcc9b45e0db9511b4adde65a31c284c0dbb9244c86eba4ebec05
4b26d311e04029cced51f9a809b39ac314386edbf9a19ab890a77b0405351c30
4c7fd95a858648f2b4bb672e423d1caa5b223ea0cb03068f77963d5b104ce722
4da67a7baa47a2e6f1ccb078ddcffa4c451d8d59f44c7b1c888bbb283f92a866
6939ba410f70b71d2401adc87cdb8ab74b7d00eb20cbb836a260dd9ef33fe419
87f1c327dd5c1bd2ad7764b633b4f18b354a5ae38467267e7d4f6635eb20184e
9d34d761501d67dc006a5e57a1b0b174f85f47ee23546a37124e47eb3d1ed67f
9f6b5d597c21958d0fd5cbf3ce5522a470f2531d888a0a2ea91bcc564cb1c4df
d63d9319a299af22996c2bfb16c1330bb673d99efd4686c8c490223817ec7ee4
eabb5d111d82455b0cb37832e0683cdaa7b097a99785311f08a162dc83854808
f6c02c843627295a9b5a7ae4496758d7adee6a7bb00a7e3136fe4c8f4f07d3f2
fdd3afadae8e86616b60a7297f8d7900307eee81d236190f943fe3e3c477e783