bbtaccesslogin.ddns.net
Open in
urlscan Pro
150.230.118.80
Malicious Activity!
Public Scan
Effective URL: http://bbtaccesslogin.ddns.net/1.html?=_03776e4d00bc5e97711c835f1c9b4a70=
Submission: On December 24 via automatic, source openphish — Scanned from GB
Summary
This is the only time bbtaccesslogin.ddns.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: BB&T Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 150.230.118.80 150.230.118.80 | 31898 (ORACLE-BM...) (ORACLE-BMC-31898) | |
23 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
ddns.net
bbtaccesslogin.ddns.net |
626 KB |
0 |
bbt.com
Failed
ox-d.bbt.com Failed |
|
23 | 2 |
Domain | Requested by | |
---|---|---|
22 | bbtaccesslogin.ddns.net |
bbtaccesslogin.ddns.net
|
0 | ox-d.bbt.com Failed |
bbtaccesslogin.ddns.net
|
23 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://bbtaccesslogin.ddns.net/1.html?=_03776e4d00bc5e97711c835f1c9b4a70=
Frame ID: 5B5A4EBDE646C51CC2A327D490E2C96D
Requests: 23 HTTP requests in this frame
Screenshot
Page Title
BB&T Bank | Personal Banking, Business Banking, Mortgages, InvestmentsPage URL History Show full URLs
- http://bbtaccesslogin.ddns.net/ Page URL
- http://bbtaccesslogin.ddns.net/1.html?=_03776e4d00bc5e97711c835f1c9b4a70= Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://bbtaccesslogin.ddns.net/ Page URL
- http://bbtaccesslogin.ddns.net/1.html?=_03776e4d00bc5e97711c835f1c9b4a70= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
bbtaccesslogin.ddns.net/ |
148 B 355 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
1.html
bbtaccesslogin.ddns.net/ |
53 KB 53 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.css
bbtaccesslogin.ddns.net/T.goe/ |
209 KB 209 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.js
bbtaccesslogin.ddns.net/T.goe/ |
84 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.js
bbtaccesslogin.ddns.net/T.goe/ |
30 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
bbtaccesslogin.ddns.net/T.goe/ |
179 B 420 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
bbtaccesslogin.ddns.net/T.goe/ |
265 B 506 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
bbtaccesslogin.ddns.net/T.goe/ |
293 B 534 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
33.png
bbtaccesslogin.ddns.net/T.goe/ |
362 B 603 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.jpg
bbtaccesslogin.ddns.net/T.goe/ |
53 KB 53 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.gif
bbtaccesslogin.ddns.net/T.goe/ |
43 B 283 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.jpg
bbtaccesslogin.ddns.net/T.goe/ |
69 KB 69 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
bbtaccesslogin.ddns.net/T.goe/ |
107 KB 107 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.js
bbtaccesslogin.ddns.net/T.goe/ |
17 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
roboto-light-webfont.woff2
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.woff2
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
robotoslab-regular-webfont.woff2
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
roboto-medium-webfont.woff2
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.woff
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.woff
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
arj
ox-d.bbt.com/ma/1.0/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
roboto-medium-webfont.woff
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
robotoslab-regular-webfont.woff
bbtaccesslogin.ddns.net/T.goe/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ox-d.bbt.com
- URL
- https://ox-d.bbt.com/ma/1.0/arj?auid=538587398&callback=jQuery31007631224748395056_1640351777548&_=1640351777549
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: BB&T Bank (Banking)78 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| Validator function| sfm_validator_enable_focus function| add_addnl_vfunction function| set_addnl_vfunction function| run_addnl_validations function| sfm_set_focus function| sfm_disable_validations function| sfm_enable_show_msgs_together function| sfm_validator_message_disp_pos function| clear_all_validations function| form_submit_handler function| add_validation function| handle_item_on_killfocus function| validator_enable_OPED function| validator_enable_OPED_SB function| sfm_ErrorDisplayHandler function| edh_clear_msgs function| edh_FinalShowMsg function| edh_EnableOnPageDisplay function| edh_ShowMsg function| AlertMsgDisplayer function| alert_clearmsg function| alert_showmsg function| sfm_show_error_msg function| SingleBoxErrorDisplay function| sb_div_clearmsg function| sb_div_showmsg function| form_error_div_name function| sfm_show_div_msg function| DivMsgDisplayer function| div_clearmsg function| element_div_name function| div_showmsg function| show_div_msg function| ValidationDesc function| vdesc_validate function| ValidationSet function| add_validationdesc function| vset_validate function| validateEmail function| TestComparison function| TestSelMin function| TestSelMax function| IsCheckSelected function| TestDontSelectChk function| TestShouldSelectChk function| TestRequiredInput function| TestFileExtension function| TestMaxLen function| TestMinLen function| TestInputType function| TestEmail function| TestLessThan function| TestGreaterThan function| TestRegExp function| TestDontSelect function| TestSelectOneRadio function| TestSelectRadio function| validateInput function| VWZ_IsListItemSelected function| VWZ_IsChecked function| sfm_str_trim function| VWZ_IsEmpty object| frmvalidator string| activeHomeHR object| MP function| objToString function| switchLanguage function| _classCallCheck function| _createClass function| Alert function| Button function| Collapse function| Dropdown function| Tab object| Util0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
9 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bbtaccesslogin.ddns.net
ox-d.bbt.com
ox-d.bbt.com
150.230.118.80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