www.alwalaatours.com Open in urlscan Pro
143.95.76.54  Malicious Activity! Public Scan

URL: http://www.alwalaatours.com/basic/bankofamerica/error.php
Submission Tags: @jcybersec_
Submission: On July 03 via api from GB

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 143.95.76.54, located in Los Angeles, United States and belongs to ASMALLORANGE1, US. The main domain is www.alwalaatours.com.
This is the only time www.alwalaatours.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
3 143.95.76.54 62729 (ASMALLORA...)
3 1
Apex Domain
Subdomains
Transfer
3 alwalaatours.com
www.alwalaatours.com
384 KB
3 1
Domain Requested by
3 www.alwalaatours.com www.alwalaatours.com
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.alwalaatours.com/basic/bankofamerica/error.php
Frame ID: 07FF24B5EF05CF6B7AC79144FB31775A
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

384 kB
Transfer

385 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request error.php
www.alwalaatours.com/basic/bankofamerica/
2 KB
906 B
Document
General
Full URL
http://www.alwalaatours.com/basic/bankofamerica/error.php
Protocol
HTTP/1.1
Server
143.95.76.54 Los Angeles, United States, ASN62729 (ASMALLORANGE1, US),
Reverse DNS
ip-143-95-76-54.iplocal
Software
nginx/1.14.0 /
Resource Hash
166a65965b4f994aa2061c141333d4f0f61fafea027f28b936f323c4bdcb3094

Request headers

Host
www.alwalaatours.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx/1.14.0
Date
Fri, 03 Jul 2020 07:08:00 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Content-Encoding
gzip
id2.png
www.alwalaatours.com/basic/bankofamerica/images/
330 KB
330 KB
Image
General
Full URL
http://www.alwalaatours.com/basic/bankofamerica/images/id2.png
Requested by
Host: www.alwalaatours.com
URL: http://www.alwalaatours.com/basic/bankofamerica/error.php
Protocol
HTTP/1.1
Server
143.95.76.54 Los Angeles, United States, ASN62729 (ASMALLORANGE1, US),
Reverse DNS
ip-143-95-76-54.iplocal
Software
nginx/1.14.0 /
Resource Hash
a1715a08983dab320510a022c964d682f696907fae32c1d49446ddd64f655080

Request headers

Referer
http://www.alwalaatours.com/basic/bankofamerica/error.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 03 Jul 2020 07:08:01 GMT
Last-Modified
Mon, 06 Apr 2020 19:41:32 GMT
Server
nginx/1.14.0
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
338024
Content-Type
image/png
sub.png
www.alwalaatours.com/basic/bankofamerica/images/
52 KB
53 KB
Image
General
Full URL
http://www.alwalaatours.com/basic/bankofamerica/images/sub.png
Requested by
Host: www.alwalaatours.com
URL: http://www.alwalaatours.com/basic/bankofamerica/error.php
Protocol
HTTP/1.1
Server
143.95.76.54 Los Angeles, United States, ASN62729 (ASMALLORANGE1, US),
Reverse DNS
ip-143-95-76-54.iplocal
Software
nginx/1.14.0 /
Resource Hash
6ae8c089862f94fd3e2fea921dec11b5c2440b8d115b7673b7947117f26b1794

Request headers

Referer
http://www.alwalaatours.com/basic/bankofamerica/error.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 03 Jul 2020 07:08:01 GMT
Last-Modified
Thu, 14 Mar 2019 16:59:16 GMT
Server
nginx/1.14.0
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
53690
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.alwalaatours.com
143.95.76.54
166a65965b4f994aa2061c141333d4f0f61fafea027f28b936f323c4bdcb3094
6ae8c089862f94fd3e2fea921dec11b5c2440b8d115b7673b7947117f26b1794
a1715a08983dab320510a022c964d682f696907fae32c1d49446ddd64f655080