tungyi.com
Open in
urlscan Pro
74.220.215.248
Malicious Activity!
Public Scan
Effective URL: http://tungyi.com/png/urgent/login.php?cmd=login_submit&id=497caa568e35986fbb291b92bf71da23497caa568e35986fbb291b9...
Submission Tags: 6113908
Submission: On July 10 via api from US
Summary
This is the only time tungyi.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2600:9000:200... 2600:9000:200d:6000:19:9934:6a80:93a1 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 22 | 74.220.215.248 74.220.215.248 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
21 | 1 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
qbk1o.app.link |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: host248.hostmonster.com
tungyi.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
tungyi.com
1 redirects
tungyi.com |
1 MB |
1 |
app.link
1 redirects
qbk1o.app.link |
658 B |
21 | 2 |
Domain | Requested by | |
---|---|---|
22 | tungyi.com |
1 redirects
tungyi.com
|
1 | qbk1o.app.link | 1 redirects |
21 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://tungyi.com/png/urgent/login.php?cmd=login_submit&id=497caa568e35986fbb291b92bf71da23497caa568e35986fbb291b92bf71da23&session=497caa568e35986fbb291b92bf71da23497caa568e35986fbb291b92bf71da23
Frame ID: 1DC36B93068594E583F5EF48FC886AA4
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://qbk1o.app.link/g8Ne3vKAaY
HTTP 307
http://tungyi.com/png/urgent/index.php?_branch_match_id=677317834979467248 HTTP 302
http://tungyi.com/png/urgent/login.php?cmd=login_submit&id=497caa568e35986fbb291b92bf71da23497... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://qbk1o.app.link/g8Ne3vKAaY
HTTP 307
http://tungyi.com/png/urgent/index.php?_branch_match_id=677317834979467248 HTTP 302
http://tungyi.com/png/urgent/login.php?cmd=login_submit&id=497caa568e35986fbb291b92bf71da23497caa568e35986fbb291b92bf71da23&session=497caa568e35986fbb291b92bf71da23497caa568e35986fbb291b92bf71da23 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
tungyi.com/png/urgent/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq1.png
tungyi.com/png/urgent/images/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq2.png
tungyi.com/png/urgent/images/ |
174 KB 175 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq3.png
tungyi.com/png/urgent/images/ |
39 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq4.png
tungyi.com/png/urgent/images/ |
478 KB 479 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bp1.png
tungyi.com/png/urgent/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bp2.png
tungyi.com/png/urgent/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq5.png
tungyi.com/png/urgent/images/ |
31 KB 31 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq6.png
tungyi.com/png/urgent/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq7.png
tungyi.com/png/urgent/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq8.png
tungyi.com/png/urgent/images/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq9.png
tungyi.com/png/urgent/images/ |
119 KB 119 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq10.png
tungyi.com/png/urgent/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq11.png
tungyi.com/png/urgent/images/ |
45 KB 45 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq12.png
tungyi.com/png/urgent/images/ |
49 KB 50 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq13.png
tungyi.com/png/urgent/images/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq15.png
tungyi.com/png/urgent/images/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq16.png
tungyi.com/png/urgent/images/ |
42 KB 42 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq14.png
tungyi.com/png/urgent/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bq17.png
tungyi.com/png/urgent/images/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bbtn1.png
tungyi.com/png/urgent/images/ |
742 B 981 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
qbk1o.app.link
tungyi.com
2600:9000:200d:6000:19:9934:6a80:93a1
74.220.215.248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