vizzanoindonesia.co.id
Open in
urlscan Pro
2606:4700:3033::6815:402
Malicious Activity!
Public Scan
Effective URL: http://vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells.htm
Submission: On February 16 via automatic, source openphish
Summary
This is the only time vizzanoindonesia.co.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 14 | 2606:4700:303... 2606:4700:3033::6815:402 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 159.45.170.156 159.45.170.156 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
14 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
vizzanoindonesia.co.id
1 redirects
vizzanoindonesia.co.id |
114 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
17 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
14 | vizzanoindonesia.co.id |
1 redirects
vizzanoindonesia.co.id
|
1 | connect.secure.wellsfargo.com |
vizzanoindonesia.co.id
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells.htm
Frame ID: 29B2309AC0ADEC242AAE6212E30897CF
Requests: 14 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/login.php
HTTP 302
http://vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells.htm Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Learn More
Search URL Search Domain Scan URL
Title: Frequently asked questions >
Search URL Search Domain Scan URL
Title: Email Security Help
Search URL Search Domain Scan URL
Title: www.wellsfargo.com/agreement
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/login.php
HTTP 302
http://vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
wells.htm
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/ Redirect Chain
|
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signonCommitment.css
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
144 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
10 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wflogo-gfrewards.png
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.2.2.js
vizzanoindonesia.co.id/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
vizzanoindonesia.co.id/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search_corner.gif
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/images/ |
6 KB 6 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
vizzanoindonesia.co.id/login/inf/access/WellsFargo/wells/wells_files/images/ |
6 KB 6 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
vizzanoindonesia.co.id/login/inf/access/WellsFargo/images/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)169 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| ndoGetObjectKeys string| ndjsStaticVersion object| nszvhlfa object| nsksabgo boolean| nspeimkxby number| nsoibexed number| nszvh object| nsepmaz object| nskstm object| nsoibexe object| nsoibe object| nsepm object| nskstmsip boolean| nskstms string| nszvhlf object| nds object| nsepmazt number| numQueries object| returned string| version undefined| nsksab string| nsvabseiis string| nsvabseii string| nsjudvctm string| nsepmaztj string| nsvabsei string| nsoib object| nsjudvct object| nszvhlfahn function| nsepma function| nspeimkx function| nskstmsipu boolean| nszvhl object| nsjudvc function| nsepmaztjz function| nskstmsi function| nspei function| nsoibex function| nskst function| nsksa function| nspeimkxb function| nspeim function| nsksabg function| nsvabse function| nsksabgokg function| nsoibexedn function| nsvab function| ndwts function| HashUtil function| nsksabgok function| nsjud function| nsjudv function| nsjudvctmh function| nsvabs function| nspeimk function| nszvhlfah function| nszrnjziw function| nsoao function| nsnapiox function| ndwti function| nsulno function| nsnapioxjn function| nssylksok function| nsoaoetz function| nszrnj function| nswkoligw function| nsuln function| nsulnoxyfy function| nsoaoetzh function| nswko function| nserngs function| nsnapioxj object| ndsapi object| antiClickjack string| webId string| ndURI object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged boolean| m object| q object| options object| lun3 boolean| isNative object| js object| fjs boolean| nsjppre function| nskvqizf object| nsjpprei function| nsotm function| nskvqizfuc object| nsceqpfgy function| nsceqp boolean| nsotme number| nsfnsjneia number| nstzyi object| nsceqpfg function| nsami object| nsfzka object| nsamixt function| nsfzkasudy object| nstzyipy function| nstzyip object| nsceqpf function| nsamix function| nstzy object| nsamixttjx boolean| nsfzkasu string| nsamixttj string| nsotmevenr function| nstzyipyj function| nsfns string| nsceqpfgyh string| nsotmeven string| nskvqi string| nsjpp string| nsfnsjn string| nsjppreib string| nsjppreibb function| nsamixtt function| nsfzkasud function| nstzyipyjt object| nsceq object| nsfzkas function| nsotmev function| nskvq function| nsotmeve function| nsfnsjne function| nsfnsj function| nsfzk function| nsfnsjnei function| nskvqiz function| nsjppr function| nskyezdcg function| nslifgqfd function| nsommc function| nsjshhg function| nslifgq function| nsvxs function| nsvxsbtzp function| nsejdim function| nsommcgf function| nsuvpbxjum function| nsejdimxe function| nslifgqf function| nstvf function| nslif function| validateSessionIdCookie function| nsuvpbx function| nsvxsbtz function| nskye object| nskvqizfu function| nskyez function| nsommcg function| nsjshhgm1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.vizzanoindonesia.co.id/ | Name: __cfduid Value: de292178a52148f2e3cbb5d23aec9266c1613438943 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
vizzanoindonesia.co.id
159.45.170.156
2606:4700:3033::6815:402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