buffalous.com
Open in
urlscan Pro
174.136.57.205
Malicious Activity!
Public Scan
Submission: On February 05 via automatic, source openphish
Summary
This is the only time buffalous.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 174.136.57.205 174.136.57.205 | 30496 (COLO4) (COLO4 - Colo4) | |
3 | 208.89.15.4 208.89.15.4 | 11054 (LIVEPERSON) (LIVEPERSON - LivePerson) | |
17 | 2 |
ASN30496 (COLO4 - Colo4, LLC, US)
PTR: king.vivawebhost.com
buffalous.com |
ASN11054 (LIVEPERSON - LivePerson, Inc., US)
PTR: intranet.liveperson.com
chat.bankofamerica.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
buffalous.com
buffalous.com |
252 KB |
3 |
bankofamerica.com
chat.bankofamerica.com |
37 KB |
17 | 2 |
Domain | Requested by | |
---|---|---|
14 | buffalous.com |
buffalous.com
|
3 | chat.bankofamerica.com |
buffalous.com
|
17 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://buffalous.com/bofa/security.php
Frame ID: 21771.1
Requests: 17 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
security.php
buffalous.com/bofa/ |
28 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.css
buffalous.com/bofa/files/ |
90 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.css
buffalous.com/bofa/files/ |
184 KB 33 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global-jawr.js
buffalous.com/bofa/files/ |
270 KB 87 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vipaa-jawr.js
buffalous.com/bofa/files/ |
328 KB 72 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
deploy2.js
buffalous.com/bofa/files/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mTag.js
buffalous.com/bofa/files/ |
17 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bac_reg_logo_tmp_250X69.gif
buffalous.com/bofa/files/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
continue.jpg
buffalous.com/bofa/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mtagconfig.js
buffalous.com/bofa/files/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
fsd-secure-esp-sprite.png
buffalous.com/pa/components/modules/header-module/2.1/graphic/ |
8 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
fsd-arrows.png
buffalous.com/pa/components/modules/quick-help-module/2.0/graphic/ |
11 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
gfootb-static-sprite.png
buffalous.com/pa/components/modules/global-footer-module/2.5/graphic/ |
8 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
gfoot-home-icon.png
buffalous.com/pa/components/modules/global-footer-module/2.5/graphic/ |
8 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
deploy2.asp
chat.bankofamerica.com/visitor/addons/ |
20 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mTag.js
chat.bankofamerica.com/hcp/html/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
/
chat.bankofamerica.com/hc/LPBofA2/ |
108 B 108 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.buffalous.com/ | Name: frontend Value: mjc484gvdu2chtv02bvapn8cc2 |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
buffalous.com
chat.bankofamerica.com
174.136.57.205
208.89.15.4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