www.accessbquickfo.com
Open in
urlscan Pro
172.67.163.244
Malicious Activity!
Public Scan
Effective URL: https://www.accessbquickfo.com/
Submission Tags: @phish_report
Submission: On July 05 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by WE1 on June 30th 2024. Valid for: 3 months.
This is the only time www.accessbquickfo.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 172.67.163.244 172.67.163.244 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 188.114.96.3 188.114.96.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
21 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
accessbquickfo.com
www.accessbquickfo.com |
1016 KB |
6 |
jstestnamea.top
klbq.jstestnamea.top |
58 KB |
21 | 2 |
Domain | Requested by | |
---|---|---|
15 | www.accessbquickfo.com |
www.accessbquickfo.com
|
6 | klbq.jstestnamea.top | |
21 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
accessbquickfo.com WE1 |
2024-06-30 - 2024-09-28 |
3 months | crt.sh |
jstestnamea.top WE1 |
2024-06-30 - 2024-09-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.accessbquickfo.com/
Frame ID: C44DA54B1876F088AF8B4CC14175B698
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
BOAPage URL History Show full URLs
-
http://www.accessbquickfo.com/
HTTP 307
https://www.accessbquickfo.com/ Page URL
Detected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.accessbquickfo.com/
HTTP 307
https://www.accessbquickfo.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.accessbquickfo.com/ Redirect Chain
|
682 B 783 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.079ce67f.js
www.accessbquickfo.com/js/ |
2 MB 572 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.432c6eb0.js
www.accessbquickfo.com/js/ |
336 KB 144 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.af95b458.css
www.accessbquickfo.com/css/ |
266 KB 65 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.88b7a101.css
www.accessbquickfo.com/css/ |
137 KB 40 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.aaec4baa.svg
www.accessbquickfo.com/img/ |
3 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cunru.5d3a85db.jpg
www.accessbquickfo.com/img/ |
13 KB 12 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
zhuanchu.bf791320.jpg
www.accessbquickfo.com/img/ |
13 KB 12 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kefu.a949ece3.jpg
www.accessbquickfo.com/img/ |
15 KB 15 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
982 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heart
www.accessbquickfo.com/api/Lottery/ |
7 KB 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
index
www.accessbquickfo.com/api/Lottery/ |
7 KB 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home_banner.5e66accb.jpg
www.accessbquickfo.com/img/ |
58 KB 56 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NTR.e1571038.ttf
www.accessbquickfo.com/fonts/ |
46 KB 47 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NTSB.bf29907f.ttf
www.accessbquickfo.com/fonts/ |
46 KB 47 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.accessbquickfo.com/ |
4 KB 1 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d318c1cceb20d22aaaa17854c25e84cc.jpg
klbq.jstestnamea.top/uploads/20230624/ |
7 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e2ca5e056aba8b44b793477971558e1b.jpg
klbq.jstestnamea.top/uploads/20230624/ |
29 KB 22 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5d32a9ad3eebb7b7e6ab3549690d249d.jpg
klbq.jstestnamea.top/uploads/20230624/ |
4 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e9379b0015b3abb532051d4dcce90c65.jpg
klbq.jstestnamea.top/uploads/20230624/ |
7 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ad101cdb1edb10856f05f869e045d856.jpg
klbq.jstestnamea.top/uploads/20230624/ |
22 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7dfd500409b2a36f8eb8f2497b167743.jpg
klbq.jstestnamea.top/uploads/20230624/ |
13 KB 10 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage object| webpackChunkBOA object| __VUE_INSTANCE_SETTERS__ boolean| __INTLIFY_PROD_DEVTOOLS__ boolean| __INTLIFY_JIT_COMPILATION__ boolean| __INTLIFY_DROP_MESSAGE_COMPILER__ boolean| __VUE_I18N_FULL_INSTALL__ boolean| __VUE_I18N_LEGACY_API__ object| lib number| rem number| dpr boolean| __VUE__ function| $uploadAxios0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
klbq.jstestnamea.top
www.accessbquickfo.com
172.67.163.244
188.114.96.3
07fc52beba3e4da44b4637231de15f71684707ab5c1e2b6494dfe18c3ed0b9d6
14fcf70a1f869ec6d28f457b5c7f7278f40d16c71eac6f757ae5e0481cb61975
1b21741067ff4801f3f65177e6b39119837bdb936b9f08a4b202d8dc564a3f62
27585538235cd1bfa057737ad2f5444bd89bb872999a37185e19d7fcc5a9e487
2c2418137ce8e8be5db716f8b67fcc22e3b72ce29f0fafe4b8b0c7439d5e39ff
2c270a31ad25bad2c2c0d7f5456abfa5f78e86c2a1b12c29ecc4c6ce015b1e03
2ec133f9ae988203604c2f808da7594a0e6f03cac7584f81a7ea9dbaa5ee0941
3806c41c2a6786439c5dbbb738f8b2705377648f9075657509514be111f2c330
49d1f3a6f0573d2ecbd26d65cdaced906e11710f0f04fffde70e19671fc3d472
5056f7cfa129900ec7c033624d01673a2ec64d833803c4b87c916f769dcfcf93
5c81d703f1bce50770265d57ad3db7bd3b468ad103b55d75db95d943ad9ea3b3
623d53697133bfce0f49b641d26f69d000d7a2bdae623ee9eb5f5ea0aaf805f2
65c893f483bb416f89702b47d573c25934e322290019652d04c863a23560cc4e
6b64016a8213dc8c89593b57d52b1325da4ba7db820ff01f3e14b1209c37e26f
73fbf463737e7d65c7fffbc4c40a33201b31c721a6948c2a7f2dd75a31e62cd5
7cc670ff7e30c4671b33ec18303f1106417d9b8c3ca28b589657afab40f359dc
7e6ce497138ce47d8ab66d70c46d245e1261d7f2d3f1db3556eec0ca1c82e2ec
8b8a27aab4526309ef99476eecd4b0ecc4d34516f1e27c927f4cdbca31a08de3
9aee503e8c9126e238639973a7eb7830ae02b4aed2a8f453b0f86300c2b5a9af
a012218254208c53c78f2b0aa2efc97a518d883ffd8f4720e017c6bc83247c26
b3c66bfc20559090f6f8ff2093075b4cf15f5542acfa8c54961e3a43572ba016
b8dcbe6c77d251e84aa1022bee92cb861c59ab1bc8d2873a53fa0d16f19d5163
db74ab0b78338c1f778f8398c45f4103c99aea0e845a3118a7750b4eeafd3445
e50c88d7b9465b4cf84896222836073e2e65b748594a20377cbadf6394db9ea5
f7d1fc4ec1b42a3681afbc1aa68b9a531e5a947e59badf172f57cc5e4acca126