www.offshoreoil.com
Open in
urlscan Pro
69.16.209.251
Malicious Activity!
Public Scan
Submission: On November 09 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on September 13th 2017. Valid for: 3 months.
This is the only time www.offshoreoil.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 69.16.209.251 69.16.209.251 | 32244 (LIQUID-WE...) (LIQUID-WEB-INC - Liquid Web) | |
13 | 1 |
ASN32244 (LIQUID-WEB-INC - Liquid Web, L.L.C, US)
PTR: liquid.netyeti.com
www.offshoreoil.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
offshoreoil.com
www.offshoreoil.com |
572 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
13 | www.offshoreoil.com |
www.offshoreoil.com
|
13 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bankofamerica.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
offshoreoil.com cPanel, Inc. Certification Authority |
2017-09-13 - 2017-12-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.offshoreoil.com/boa/en/en/
Frame ID: 31240.1
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Learn more about Online Banking
Search URL Search Domain Scan URL
Title: Service Agreement
Search URL Search Domain Scan URL
Title: Privacy & Security
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.offshoreoil.com/boa/en/en/ |
13 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
soa.js
www.offshoreoil.com/boa/en/en/imgs/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
www.offshoreoil.com/boa/en/en/imgs/ |
133 KB 133 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
www.offshoreoil.com/boa/en/en/imgs/ |
355 KB 355 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LOGO.gif
www.offshoreoil.com/boa/en/en/imgs/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secure.png
www.offshoreoil.com/boa/en/en/imgs/ |
473 B 473 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
summary-bground.jpg
www.offshoreoil.com/boa/en/en/imgs/ |
351 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
help-qmark.png
www.offshoreoil.com/boa/en/en/imgs/ |
546 B 546 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfootb.png
www.offshoreoil.com/boa/en/en/imgs/ |
48 KB 48 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gfoot-home.png
www.offshoreoil.com/boa/en/en/imgs/ |
144 B 144 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fsd-arrows.png
www.offshoreoil.com/boa/en/en/imgs/ |
246 B 246 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.woff
www.offshoreoil.com/pa/global-assets/1.0/font/cnx-regular/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cnx-regular.ttf
www.offshoreoil.com/pa/global-assets/1.0/font/cnx-regular/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.offshoreoil.com
69.16.209.251
0509ef5fb3dad7001f5095ebe63933dff0e0d113045e696ed16ff46ce5af8c72
07e4c753ffc2eb5b218c8f022406951f1c052771ffe9b22aecff0e705f4c13f8
092f0fd4ebf0542f944fb3ff4d704bfc308daf374efd1bfe5d7f37e2ac62060c
3adf88f5253c08e5a1a51d4af9f9439c8fcaba6715ab6ebfccc83d7e1e254236
6b28134763b4b32a61d1dc80c408fc211f73dc758a22ef0c8e5e83ea770a61f7
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8
8c37fb372596058d87dd9208541c49b020d0e840e4f3a5baa27d39be2dc70b01
a8bc6337547a246ef75d1ae66d7ec8a0ed6171c1ba49804a403124e27c8e8452
ca3205c6a4eecfd67ad990b62b10e19f601230a2a5b2791676089e82836763f4
ec8a7b5d27dd9c4cd59db1c74a73aec065c0660675f7ef26f300ab49e4bb5825
f771c620afc7baf4801fa9260941d6ab72c7cca782d37ac9e7d107c81f90f91d