bankofamerica24hservice.qgsm.ro
Open in
urlscan Pro
185.163.108.18
Malicious Activity!
Public Scan
Submission: On October 22 via api from CA
Summary
This is the only time bankofamerica24hservice.qgsm.ro was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bank of America (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 185.163.108.18 185.163.108.18 | 9009 (M247) (M247) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
1 | 2a00:1450:400... 2a00:1450:4001:818::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 171.161.198.200 171.161.198.200 | 10794 (BANKAMERICA) (BANKAMERICA - Bank of America) | |
1 | 2a00:1450:400... 2a00:1450:4001:80b::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
10 | 6 |
ASN9009 (M247, GB)
PTR: host1.hostmama.ro
bankofamerica24hservice.qgsm.ro |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip0x00f.map2.ssl.hwcdn.net
maxcdn.bootstrapcdn.com |
ASN10794 (BANKAMERICA - Bank of America, US)
secure.bankofamerica.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
qgsm.ro
bankofamerica24hservice.qgsm.ro |
10 KB |
2 |
googleapis.com
ajax.googleapis.com fonts.googleapis.com |
30 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
30 KB |
1 |
gstatic.com
fonts.gstatic.com |
9 KB |
1 |
bankofamerica.com
secure.bankofamerica.com |
3 KB |
10 | 5 |
Domain | Requested by | |
---|---|---|
4 | bankofamerica24hservice.qgsm.ro |
bankofamerica24hservice.qgsm.ro
|
2 | maxcdn.bootstrapcdn.com |
bankofamerica24hservice.qgsm.ro
|
1 | fonts.gstatic.com |
bankofamerica24hservice.qgsm.ro
|
1 | secure.bankofamerica.com |
bankofamerica24hservice.qgsm.ro
|
1 | fonts.googleapis.com |
bankofamerica24hservice.qgsm.ro
|
1 | ajax.googleapis.com |
bankofamerica24hservice.qgsm.ro
|
10 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com COMODO RSA Domain Validation Secure Server CA |
2018-10-03 - 2019-10-12 |
a year | crt.sh |
*.googleapis.com Google Internet Authority G3 |
2018-10-02 - 2018-12-25 |
3 months | crt.sh |
secure.bankofamerica.com Entrust Certification Authority - L1M |
2018-05-15 - 2019-05-15 |
a year | crt.sh |
*.google.com Google Internet Authority G3 |
2018-10-02 - 2018-12-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://bankofamerica24hservice.qgsm.ro/signin/
Frame ID: 75CA9ABC5EC71B811DFE39568E3F3018
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
- script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bankofamerica24hservice.qgsm.ro/signin/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
bankofamerica24hservice.qgsm.ro/signin/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.3.1/ |
85 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
2 KB 665 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bac_reg_logo_tmp_250X69.gif
secure.bankofamerica.com/content/images/ContextualSiteGraphics/Logos/en_US/ |
4 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.png
bankofamerica24hservice.qgsm.ro/signin/images/ |
473 B 743 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprint.png
bankofamerica24hservice.qgsm.ro/signin/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v15/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bank of America (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| me function| me2 function| me3 function| validateForm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bankofamerica24hservice.qgsm.ro
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
secure.bankofamerica.com
171.161.198.200
185.163.108.18
209.197.3.15
2a00:1450:4001:80b::2003
2a00:1450:4001:80b::200a
2a00:1450:4001:818::200a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