play4shopping.com
Open in
urlscan Pro
2606:4700:30::681c:1513
Malicious Activity!
Public Scan
Submission: On November 30 via automatic, source phishtank
Summary
This is the only time play4shopping.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
21 | 2606:4700:30:... 2606:4700:30::681c:1513 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
22 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
play4shopping.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
play4shopping.com
play4shopping.com |
1 MB |
1 |
sitepoint.com
www.sitepoint.com |
|
22 | 2 |
Domain | Requested by | |
---|---|---|
21 | play4shopping.com |
play4shopping.com
|
1 | www.sitepoint.com |
play4shopping.com
|
22 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.sitepoint.com Let's Encrypt Authority X3 |
2019-10-28 - 2020-01-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://play4shopping.com/include/css/bankofamerica.com.4545dwer/234/login.php?cmd=login_submit&id=65043f71a91469e760e5a869b40d51c865043f71a91469e760e5a869b40d51c8&session=65043f71a91469e760e5a869b40d51c865043f71a91469e760e5a869b40d51c8
Frame ID: F75D80B2714F451F2724B57D5F5C2775
Requests: 22 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q1.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q2.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
193 KB 194 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q3.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
42 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q4.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
464 KB 465 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p1.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
p2.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q5.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q6.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q7.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q8.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q9.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
60 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q10.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q11.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
45 KB 45 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q12.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
49 KB 50 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q13.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q15.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q16.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
42 KB 42 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q14.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
q17.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn1.png
play4shopping.com/include/css/bankofamerica.com.4545dwer/234/images/ |
742 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
play4shopping.com
www.sitepoint.com
2606:4700:30::681c:1513
54.148.84.95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