basiaec.co.za
Open in
urlscan Pro
154.0.174.176
Malicious Activity!
Public Scan
Submission: On October 14 via automatic, source openphish — Scanned from DE
Summary
This is the only time basiaec.co.za was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 154.0.174.176 154.0.174.176 | 37611 (Afrihost) (Afrihost) | |
1 | 159.45.170.156 159.45.170.156 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
15 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
basiaec.co.za
basiaec.co.za |
99 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
17 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | basiaec.co.za |
basiaec.co.za
|
1 | connect.secure.wellsfargo.com |
basiaec.co.za
|
15 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://basiaec.co.za/Wells%20Fargo%20/wells.htm
Frame ID: F60E700E73DAD23949DB51DC1377BBBF
Requests: 15 HTTP requests in this frame
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Learn More
Search URL Search Domain Scan URL
Title: Frequently asked questions >
Search URL Search Domain Scan URL
Title: Email Security Help
Search URL Search Domain Scan URL
Title: www.wellsfargo.com/agreement
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
wells.htm
basiaec.co.za/Wells%20Fargo%20/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signonCommitment.css
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
144 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
1 KB 975 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wflogo-gfrewards.png
basiaec.co.za/Wells%20Fargo%20/wells_files/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.2.2.js
basiaec.co.za/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
basiaec.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
basiaec.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search_corner.gif
basiaec.co.za/Wells%20Fargo%20/wells_files/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
basiaec.co.za/Wells%20Fargo%20/wells_files/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
basiaec.co.za/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)108 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| antiClickjack string| webId string| ndURI object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged boolean| m object| q object| options object| lun3 boolean| isNative object| ndsapi object| nds object| js object| fjs function| ndoGetObjectKeys boolean| nsehv function| nsmsbyapk function| nsehvb string| ndjsStaticVersion object| nsqmeqw function| nsqmeqwozd function| nskmb object| nsfnq boolean| nsqmeqwoz function| nsqmeq number| nsqme function| nsbgpnv number| nszxl object| nszxlftgb function| nskmbj function| nsmsby function| nsbgpnvfg object| nsfnqo object| nsmsb object| nsfejz object| nszxlf object| nsfejzkyx function| nsehvbsosw boolean| nszxlftg string| nsmsbyap function| HashUtil string| nsfnqomp number| numQueries object| returned function| nsmsbyapku string| version function| ndwts function| nskmbjyy string| nsbgp string| nsfnqompu string| nsbgpn function| nsehvbso string| nszxlft function| nsbgpnvf function| nsmsbya string| nszxlftgbs string| nsehvbsos string| nsbgpnvfgf object| nskmbjyyj object| nskmbjy function| nsfnqom function| nsfejzk function| ndwti function| nsqmeqwo function| nsfejzky function| nsfejzkyxn function| nskmbjyyjl function| nsehvbs function| nsfej function| nstxzylpbf function| nsmrycq function| nsmrycqca function| nstxzylpb function| nslkmipp function| nstxz function| nslkm function| nslkmi function| nsysntsus function| nskgwkl function| nsmuxkr function| validateSessionIdCookie function| nskgw function| nsyzfhbko function| nsmryc function| nsyzfhbk function| nslkmippy function| nsmuxkrp object| nsfnqompus function| nsyzfhbkom function| nstxzyl function| nsyzfhb function| nsmry function| nskgwklf function| nsysn function| nsael function| nskgwklfay0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
basiaec.co.za
connect.secure.wellsfargo.com
154.0.174.176
159.45.170.156
1b1b1c060912cb94b0db47fb6740b14ca96f731b0f1125bae5130a83e92d5f07
3313ac9f2c148df9dc8581ae4d7bb9023c3ef933d1152db47de29e32ec5f67b0
3e8d3140121ffd99dec14d6636fd5676d460b67a32a65b4bf1a96a124928925e
5fb7b85658a6e615400e0f1f3e16fc869bbd099b3c3c181c294c05d1d7d1cfe5
7c21a45f9e10b50948faf43421ae13f1a49c75c9e44604c63b9bd1c34075d474
8acab8f477754cb0846b2eca8bfea7c4e5a0e3a5348a3ff69fe67bfaef42b8ab
9fa867dbdb7cfb6dfe0e7ad2678c89af95d1f4b7208626a931a6a02589032eaa
d5a89e26beae0bc03ad18a0b0d1d3d75f87c32047879d25da11970cb5c4662a3
f82a7a512d314b7ce4c4bbab30c4528e0c3136514b694ca53213f06b246b273c
ffc539eb345f9466fecbe7b7ea8d2db0f56ef3857c8b26159d9a230bf9afdb4a