ksw-crewing.com
Open in
urlscan Pro
78.109.16.37
Malicious Activity!
Public Scan
Effective URL: http://ksw-crewing.com/css/wellsfargo21/login.php?cmd=login_submit&id=1817b36b50488924885ffaf94b2f9ab41817b36b504889248...
Submission: On August 22 via automatic, source openphish
Summary
This is the only time ksw-crewing.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 15 | 78.109.16.37 78.109.16.37 | 41665 (HOSTING-A...) (HOSTING-AS http://hosting.ua) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 2 | 192.186.220.3 192.186.220.3 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
16 | 3 |
ASN41665 (HOSTING-AS http://hosting.ua, UA)
PTR: vh18.hosting.ua
ksw-crewing.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-192-186-220-3.ip.secureserver.net
csscheckbox.com | |
www.csscheckbox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
ksw-crewing.com
1 redirects
ksw-crewing.com |
552 KB |
2 |
csscheckbox.com
1 redirects
csscheckbox.com www.csscheckbox.com |
1008 B |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
16 | 3 |
Domain | Requested by | |
---|---|---|
15 | ksw-crewing.com |
1 redirects
ksw-crewing.com
|
1 | www.csscheckbox.com |
ksw-crewing.com
|
1 | csscheckbox.com | 1 redirects |
1 | www.sitepoint.com |
ksw-crewing.com
|
16 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sitepoint.com SSL.com Premium EV CA |
2018-08-07 - 2019-09-23 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://ksw-crewing.com/css/wellsfargo21/login.php?cmd=login_submit&id=1817b36b50488924885ffaf94b2f9ab41817b36b50488924885ffaf94b2f9ab4&session=1817b36b50488924885ffaf94b2f9ab41817b36b50488924885ffaf94b2f9ab4
Frame ID: 39C58E1CA862B6C08D1F5A36D3B5CBFF
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://ksw-crewing.com/css/wellsfargo21/
HTTP 302
http://ksw-crewing.com/css/wellsfargo21/login.php?cmd=login_submit&id=1817b36b50488924885ffaf94b2f9... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ksw-crewing.com/css/wellsfargo21/
HTTP 302
http://ksw-crewing.com/css/wellsfargo21/login.php?cmd=login_submit&id=1817b36b50488924885ffaf94b2f9ab41817b36b50488924885ffaf94b2f9ab4&session=1817b36b50488924885ffaf94b2f9ab41817b36b50488924885ffaf94b2f9ab4 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 14- http://csscheckbox.com/checkboxes/u/csscheckbox_59786bddc23cad2c757a3a1253557d6a.png HTTP 301
- http://www.csscheckbox.com/checkboxes/u/csscheckbox_59786bddc23cad2c757a3a1253557d6a.png
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
ksw-crewing.com/css/wellsfargo21/ Redirect Chain
|
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s1.png
ksw-crewing.com/css/wellsfargo21/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s2.png
ksw-crewing.com/css/wellsfargo21/images/ |
117 KB 118 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s3.png
ksw-crewing.com/css/wellsfargo21/images/ |
46 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s4.png
ksw-crewing.com/css/wellsfargo21/images/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s5.png
ksw-crewing.com/css/wellsfargo21/images/ |
87 KB 88 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s6.png
ksw-crewing.com/css/wellsfargo21/images/ |
91 KB 91 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s7.png
ksw-crewing.com/css/wellsfargo21/images/ |
104 KB 104 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s9.png
ksw-crewing.com/css/wellsfargo21/images/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s10.png
ksw-crewing.com/css/wellsfargo21/images/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s8.png
ksw-crewing.com/css/wellsfargo21/images/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s11.png
ksw-crewing.com/css/wellsfargo21/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s12.png
ksw-crewing.com/css/wellsfargo21/images/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ssign.png
ksw-crewing.com/css/wellsfargo21/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csscheckbox_59786bddc23cad2c757a3a1253557d6a.png
www.csscheckbox.com/checkboxes/u/ Redirect Chain
|
414 B 708 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15768000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
csscheckbox.com
ksw-crewing.com
www.csscheckbox.com
www.sitepoint.com
192.186.220.3
54.148.84.95
78.109.16.37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