www.icpingenieria.cl
Open in
urlscan Pro
201.217.240.10
Malicious Activity!
Public Scan
Submission: On March 24 via automatic, source phishtank
Summary
This is the only time www.icpingenieria.cl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 201.217.240.10 201.217.240.10 | 263237 (POWER HOS...) (POWER HOST E.I.R.L.) | |
1 | 104.19.196.102 104.19.196.102 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
3 | 171.161.206.200 171.161.206.200 | 10794 (BANKAMERICA) (BANKAMERICA - Bank of America) | |
19 | 4 |
ASN263237 (POWER HOST E.I.R.L., CL)
PTR: ast24010scl-static.adx.cl
www.icpingenieria.cl |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN10794 (BANKAMERICA - Bank of America, US)
secure.bankofamerica.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
icpingenieria.cl
www.icpingenieria.cl |
661 KB |
3 |
bankofamerica.com
secure.bankofamerica.com |
26 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
78 KB |
19 | 3 |
Domain | Requested by | |
---|---|---|
15 | www.icpingenieria.cl |
www.icpingenieria.cl
|
3 | secure.bankofamerica.com |
www.icpingenieria.cl
|
1 | cdnjs.cloudflare.com |
www.icpingenieria.cl
|
19 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.icpingenieria.cl/admin/xajax/tests/suite/img/en/OnlineBanking
Frame ID: 33B3F5B4A43F6F1DFEAE4BAE024EE703
Requests: 20 HTTP requests in this frame
Screenshot
Detected technologies
ZURB Foundation (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+foundation[^>"]+css/i
- html /<div [^>]*class="[^"]*(?:small|medium|large)-\d{1,2} columns/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/jquery.js HTTP 307
- https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/jquery.js
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
OnlineBanking
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/ |
48 KB 48 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
abpa-foundation.css
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/ |
151 KB 152 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
abpa-responsive.css
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/ |
92 KB 93 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.css
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/ |
16 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme-th.css
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/ Redirect Chain
|
258 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/js/ |
74 KB 75 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
crypt.js
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/js/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
BankofAmerica_logo_2x.svg
secure.bankofamerica.com/pa/components/modules/abpa-wizard-module-2.0/1.0/images/ |
7 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.gif
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/images/ |
4 KB 5 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
verification.png
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bank-cards-xxl.png
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/images/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
processing-wheel_46x46.gif
secure.bankofamerica.com/pa/components/modules/abpa-wizard-module-2.0/1.0/images/ |
4 KB 5 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
plugins.js
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/js/ |
54 KB 55 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rebel.js
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/js/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
219 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error-large.gif
secure.bankofamerica.com/pa/components/modules/messaging-module/2.0/graphic/ |
13 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Responsive_Application.woff
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/fonts/ |
6 KB 6 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
connections_regular-web.woff
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/fonts/ |
82 KB 83 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
connections_medium-web.woff
www.icpingenieria.cl/admin/xajax/tests/suite/img/en/css/fonts/ |
87 KB 87 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Bank of America (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| Aes object| Base64 object| Utf81 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.icpingenieria.cl/ | Name: PHPSESSID Value: 5uaos0du8b87pb6lorviaf1fi2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
secure.bankofamerica.com
www.icpingenieria.cl
104.19.196.102
171.161.206.200
201.217.240.10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