bankofamerica09support.duckdns.org
Open in
urlscan Pro
150.136.87.166
Malicious Activity!
Public Scan
Submission: On December 31 via automatic, source openphish
Summary
This is the only time bankofamerica09support.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 150.136.87.166 150.136.87.166 | 31898 (ORACLE-BM...) (ORACLE-BMC-31898) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a04:4e42:3::621 2a04:4e42:3::621 | 54113 (FASTLY) (FASTLY) | |
1 1 | 2606:4700:303... 2606:4700:3031::681c:1477 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 4 |
ASN31898 (ORACLE-BMC-31898, US)
bankofamerica09support.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
duckdns.org
bankofamerica09support.duckdns.org |
634 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
6 KB |
1 |
jqueryvalidation.org
1 redirects
jqueryvalidation.org |
758 B |
1 |
jsdelivr.net
cdn.jsdelivr.net |
12 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
14 | 5 |
Domain | Requested by | |
---|---|---|
11 | bankofamerica09support.duckdns.org |
bankofamerica09support.duckdns.org
|
1 | cdnjs.cloudflare.com |
bankofamerica09support.duckdns.org
|
1 | jqueryvalidation.org | 1 redirects |
1 | cdn.jsdelivr.net |
bankofamerica09support.duckdns.org
|
1 | ajax.googleapis.com |
bankofamerica09support.duckdns.org
|
14 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1O1 |
2020-11-10 - 2021-02-02 |
3 months | crt.sh |
f3.shared.global.fastly.net GlobalSign CloudSSL CA - SHA256 - G3 |
2020-10-26 - 2021-04-17 |
6 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://bankofamerica09support.duckdns.org/BofA/Step1.php?cmd=_account-details&session=bba91486dc70db1e61338ae6276ce707&dispatch=1801d8a79fa66369f702bbd8f87b8f1855bb697b
Frame ID: 05AC460A5072224D715D0925BDA0628C
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://cdn.jsdelivr.net/jquery.validation/1.14.0/jquery.validate.js HTTP 307
- https://cdn.jsdelivr.net/jquery.validation/1.14.0/jquery.validate.js
- http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
- https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.19.2/additional-methods.min.js
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Step1.php
bankofamerica09support.duckdns.org/BofA/ |
20 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
frd.css
bankofamerica09support.duckdns.org/BofA/assets/css/ |
318 KB 318 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
verify2.css
bankofamerica09support.duckdns.org/BofA/assets/css/ |
219 KB 219 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
bankofamerica09support.duckdns.org/BofA/assets/js/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/ Redirect Chain
|
42 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.19.2/ Redirect Chain
|
22 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.gif
bankofamerica09support.duckdns.org/BofA/assets/img/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
house.gif
bankofamerica09support.duckdns.org/BofA/assets/img/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secure-sprite.png
bankofamerica09support.duckdns.org/BofA/assets/img/ |
473 B 714 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bar-sprite.gif
bankofamerica09support.duckdns.org/BofA/assets/img/ |
680 B 921 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bar2-sprite.png
bankofamerica09support.duckdns.org/BofA/assets/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fot-sprite.png
bankofamerica09support.duckdns.org/BofA/assets/img/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home-icon.png
bankofamerica09support.duckdns.org/pa/components/modules/global-footer-module/2.5/graphic/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| movetoNext0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bankofamerica09support.duckdns.org
cdn.jsdelivr.net
cdnjs.cloudflare.com
jqueryvalidation.org
150.136.87.166
2606:4700:3031::681c:1477
2606:4700::6810:135e
2a00:1450:4001:800::200a
2a04:4e42:3::621
092bcd41933eafc9d859063ff5eb4812581c734a74e52fb4298826baea316bce
61c6caebd23921741fb5ffe6603f16634fca9840c2bf56ac8201e9264d6daccf
6faff1c939a50b046b98c124b959cb7cba4782252358581a19cbb06e9896afdc
769a6653733b3e64e850f13421940414afafe8625acf963354e64dfaec51883c
81b6055cee7b9041a9ab190b679cad2dd6eeebcf0d8b28c286efe3fd14d63ea4
846b450c473f23e66dfb6ea4c882fc1194486fe28ef78a9b5326483a9338ab52
8c37fb372596058d87dd9208541c49b020d0e840e4f3a5baa27d39be2dc70b01
9a5c5632847a54cab9c3e9c39175070b777f086564c7e4588b96ee0d94551b26
a5c321093780de21e48d9cb15d0b0bade2d48c8102b7cd7875a2abfdf0eeb0c6
ad5da6112553bd7511aea64dd18d23cef797432148142d766424c900dd919d0a
ca3205c6a4eecfd67ad990b62b10e19f601230a2a5b2791676089e82836763f4
d04534e0d6b65ee2ee627556a01cf990463576aac960ae9150c0fd4e10dad105
d05ba37b19ddc879a8a4fd6f594a263a3819d904e3a6ba80eef3be40541b2bb4
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3