plymouthfox.gq
Open in
urlscan Pro
2606:4700:30::681b:8f98
Malicious Activity!
Public Scan
Submission: On November 02 via automatic, source openphish
Summary
This is the only time plymouthfox.gq was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 2606:4700:30:... 2606:4700:30::681b:8f98 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
16 | 2606:4700:30:... 2606:4700:30::681b:8e98 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
22 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
plymouthfox.gq |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
plymouthfox.gq |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
plymouthfox.gq
plymouthfox.gq |
278 KB |
22 | 1 |
Domain | Requested by | |
---|---|---|
22 | plymouthfox.gq |
plymouthfox.gq
|
22 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
sitekey.bankofamerica.com |
www.bankofamerica.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/sitekeyverification.php
Frame ID: ECE579E27EA3EC47FC539AE8066006FE
Requests: 22 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: What is this?
Search URL Search Domain Scan URL
Title: Privacy & Security
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
sitekeyverification.php
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/ |
25 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.css
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/scripts/ |
68 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.css
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/scripts/ |
172 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.js
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/scripts/ |
251 KB 68 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.js
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/scripts/ |
316 KB 55 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bac_reg_logo_tmp_250X69.gif
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safepass-widget-html-util.css
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/scripts/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_equal_housing_lender.gif
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
layout-bground.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flex-bg.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
30 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blue-button-cap.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
874 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blue-button-main.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
safepass-skin1-sprite.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sp-error.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
367 B 367 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form_progress.jpg
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
red-grad-bar.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
47 KB 47 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-secure-esp-sprite.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
380 B 380 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-bground.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
129 B 496 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb-static-sprite.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form_input_help_top.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
378 B 378 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form_input_help_bottom.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
381 B 381 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
selectmenu-off-arrow.png
plymouthfox.gq/boa/BOA/Bankofamerica/New_Boa/boa/img/ |
379 B 379 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)158 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| boa function| windowSetup function| displayPopup function| boaLangSetup function| boaLocationReplace function| boaEqualHeight function| boaEqualWidth function| boaCenterAlign function| boaTLUIFieldValidationError function| boaTLAddCustomEvent function| boaTLAddEvent function| dartFireOnClick function| boaOBORestricted boolean| autoCompleteEnabled string| search_box_default string| search_box_prompt string| search_host_default function| set_css function| get_suggest function| get_jsonp_suggest function| setOptionFastSearch object| SessionTimeout function| $ function| jQuery function| setFlexLayoutFooterHeight number| flexLayoutFooterHeightOriginal number| flexLayoutCenterContentHeightOriginal object| $flexLayoutFooterDiv object| $flexLayoutFooterInner function| addPassMarkFlash2 boolean| isIE boolean| isWin boolean| isOpera function| ControlVersion function| GetSwfVer function| DetectFlashVer function| AC_AddExtension function| AC_Generateobj function| AC_FL_RunContent function| AC_GetArgs number| requiredMajorVersion number| requiredMinorVersion number| requiredRevision string| src string| width string| height string| application string| bgcolor function| showWidget string| spwSafePassNonFlashUrl string| spwPageCode string| spwFormName string| spwDeviceIndex string| spwExpand string| spwDivId number| spwProgressBarEachPercent function| showNonFlashWidget object| spwProgressBar function| isBrowserIE function| isBrowserOpera function| getVersionString function| isExternalInterfaceCompatible function| isWidgetCompatible function| isSitekeyWidgetCompatible string| $errorMessageContent string| SEP string| PAIR function| PM_FP_activeXDetect function| PM_FP_stripIllegalChars function| PM_FP_stripFullPath object| PM_FP_BrowserDetect function| PM_FP_FingerPrint function| Hashtable function| IE_FingerPrint function| Mozilla_FingerPrint function| Opera_FingerPrint function| add_deviceprint function| PM_FP_urlEncode function| encode_deviceprint function| decode_deviceprint function| post_deviceprint function| post_deviceprint_sk undefined| $ssnfirst undefined| $ssnmiddle undefined| $ssnlast object| onlineidverify object| passcodeVerify object| $quickHelpBoaLangObj function| loadURL number| skmodSiteKeyLoadLimit number| skmodSiteKeyDisplayLimit number| skmodLastSitekeyDisplayed number| skmodDisplayID number| skmodImageID string| skmodLoadPage undefined| skmodPageIndex string| skImgADAText function| skmodLogSKImageError function| skmodUpdateSKImages function| skmodUpdatePreviousNextImages function| skmodClearSKImagesSrc function| skmodClearImageSelection string| questionValue boolean| duplicateExists number| lpfielderror string| requestAuthUrl object| requstAuthCode object| $popupFsdHeader string| opt string| opt480 function| englishOnlyPopUp function| SborOOLPopUp function| ORCCOutagePopUp function| openHelp function| openHelpWindow function| openHelpHeaderModelWindow function| openHelpHeaderNWWindow function| openNWHelpWindow function| MLOOLPopUp function| OOLPopUp function| showNestedLayer function| hideNestedLayer object| cmPageViewForModal undefined| vendorURL string| CONTEXT object| olbTnCModuleTwoScrollSkin function| verifySubmit function| redirectPage function| processCoremetrics function| printContinue function| dualActionClick function| actionParam object| input number| versionStr object| theBody string| continueURL function| myUrl string| cmPageId string| cmCategoryId string| cmSessionID function| cmGetReqParameter string| testString object| cmSuccessGlob number| cmSuccess number| cmFailure string| cmErrorMsg string| cmReqLocale string| locAppendage undefined| tempArr undefined| tempStr undefined| errorCode undefined| errorCodeCounter number| begin object| $boaLangObj string| browserFullVersion string| browserClass object| $flexBottomRow number| inactiveTime0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
plymouthfox.gq
2606:4700:30::681b:8e98
2606:4700:30::681b:8f98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