albertdedionmotors.co.za Open in urlscan Pro
64.131.68.219  Malicious Activity! Public Scan

URL: http://albertdedionmotors.co.za/wp-includes/pomo/www/en/MEEE/long/online-account/security/auth/1/?773f3a8edd24bfab4ad3870700b82d...
Submission: On March 02 via automatic, source openphish

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 64.131.68.219, located in Reston, United States and belongs to SERVINT - ServInt, US. The main domain is albertdedionmotors.co.za.
This is the only time albertdedionmotors.co.za was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
1 64.131.68.219 25847 (SERVINT)
1 2
Apex Domain
Subdomains
Transfer
1 albertdedionmotors.co.za
albertdedionmotors.co.za
297 KB
1 1
Domain Requested by
1 albertdedionmotors.co.za
1 1

This site contains links to these domains. Also see Links.

Domain
www.wellsfargo.com
icomplete.wellsfargo.com
www.wellsfargorewards.com
Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://albertdedionmotors.co.za/wp-includes/pomo/www/en/MEEE/long/online-account/security/auth/1/?773f3a8edd24bfab4ad3870700b82d13-773f3a8edd24bfab4ad3870700b82d13-773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13
Frame ID: (A8A8AF1EA67FC3C2C1D23EB454FD8A76)
Requests: 10 HTTP requests in this frame

Screenshot

Page Title

Wells Fargo Sign On to Unlock Your Accounts

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

297 kB
Transfer

705 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
albertdedionmotors.co.za/wp-includes/pomo/www/en/MEEE/long/online-account/security/auth/1/
416 KB
297 KB
Document
General
Full URL
http://albertdedionmotors.co.za/wp-includes/pomo/www/en/MEEE/long/online-account/security/auth/1/?773f3a8edd24bfab4ad3870700b82d13-773f3a8edd24bfab4ad3870700b82d13-773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13773f3a8edd24bfab4ad3870700b82d13
Protocol
HTTP/1.1
Server
64.131.68.219 Reston, United States, ASN25847 (SERVINT - ServInt, US),
Reverse DNS
server.inigo.co
Software
Apache /
Resource Hash
f3e66182a9f6b2bd00e4f3a0045d60b4c7f07bee0b9a25141101099ecb7a4e8f

Request headers

Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Connection
keep-alive
Accept-Encoding
gzip, deflate
Host
albertdedionmotors.co.za
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Fri, 02 Mar 2018 21:13:39 GMT
Content-Encoding
gzip
Last-Modified
Mon, 12 Feb 2018 06:44:34 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
text/html
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
truncated
/
12 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f809fa596dc2e66029e195d0aef2d6d7b077ea1f7d145455441ba893875aec41

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
17f3818bba16137fba7657230309043ae41cd08a5df25a7c61cd9583291c1354

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
270 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2910f07eb1efbf99cb485fe848fd1aaa251bcd9c6cb3276426492daa45651be3

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
330 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
51adbf5bc6f1f859b465cdba71920ad306f53c1898dcf4a5c53e174942cac4c0

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
839 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b99dead0deb91299630edd2fdc72855aac3836ea262473d47348e218a7744264

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
467 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5145f5faf6c1269bdd974357ed344b9cd5f4e4cea424c14dd302a9c11a206741

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b319b049366dde73690990738ac5af4fb9937d18abac85b01aaff185b5262868

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
df500743bbedcef7623fdf2ef0c05ca411437c6216674271f4cc8b32f910f96d

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1ed889a15705bc76729d29d715c64f3d7f35de2ea519e1d2704924cf40d9e30d

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies