www.cktavsiye.com Open in urlscan Pro
149.202.205.16  Malicious Activity! Public Scan

URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835...
Submission: On August 12 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 149.202.205.16, located in France and belongs to OVH, FR. The main domain is www.cktavsiye.com.
This is the only time www.cktavsiye.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
3 149.202.205.16 16276 (OVH)
3 1
Apex Domain
Subdomains
Transfer
3 cktavsiye.com
www.cktavsiye.com
318 KB
3 1
Domain Requested by
3 www.cktavsiye.com www.cktavsiye.com
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835e3e9152a592a5&lcate=412aefb8e5e4d5e807176ee316590f23a9798232
Frame ID: 24005.1
Requests: 3 HTTP requests in this frame

Screenshot


Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

318 kB
Transfer

318 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request overviewshn.php
www.cktavsiye.com/bank_of_america/bofa/a689ca72/
4 KB
4 KB
Document
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835e3e9152a592a5&lcate=412aefb8e5e4d5e807176ee316590f23a9798232
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
a3268186aff20317ee952b1f4a583167f694915a0bdb7e79e80c26757952489b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:21 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
overlay.png
www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/
18 KB
18 KB
Image
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/images/overlay.png
Requested by
Host: www.cktavsiye.com
URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835e3e9152a592a5&lcate=412aefb8e5e4d5e807176ee316590f23a9798232
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
d4c6320f559647450fba0bb00adf33f8182f42f8d13fed699480c20e6a304c2c

Request headers

Referer
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835e3e9152a592a5&lcate=412aefb8e5e4d5e807176ee316590f23a9798232
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:21 GMT
Last-Modified
Fri, 11 Aug 2017 21:55:59 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
18757
bgimage.png
www.cktavsiye.com/bank_of_america/bofa/a689ca72/
296 KB
296 KB
Image
General
Full URL
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/bgimage.png
Requested by
Host: www.cktavsiye.com
URL: http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835e3e9152a592a5&lcate=412aefb8e5e4d5e807176ee316590f23a9798232
Protocol
HTTP/1.1
Server
149.202.205.16 , France, ASN16276 (OVH, FR),
Reverse DNS
ns7.domainsitesi.net
Software
Apache /
Resource Hash
552295b547de8dc2d3453246e24505349cabbc10480121b024920ea94f1afcb3

Request headers

Referer
http://www.cktavsiye.com/bank_of_america/bofa/a689ca72/overviewshn.php?read&help=create&success=bf&hm=8dd932e694f59bdf835e3e9152a592a5&lcate=412aefb8e5e4d5e807176ee316590f23a9798232
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sat, 12 Aug 2017 01:59:21 GMT
Last-Modified
Fri, 11 Aug 2017 21:55:59 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
302597

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.cktavsiye.com
149.202.205.16
552295b547de8dc2d3453246e24505349cabbc10480121b024920ea94f1afcb3
a3268186aff20317ee952b1f4a583167f694915a0bdb7e79e80c26757952489b
d4c6320f559647450fba0bb00adf33f8182f42f8d13fed699480c20e6a304c2c