fun-palast.club
Open in
urlscan Pro
2400:cb00:2048:1::681f:5307
Malicious Activity!
Public Scan
Effective URL: http://fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/ATMIdentity.html
Submission: On September 06 via automatic, source openphish
Summary
This is the only time fun-palast.club was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2400:cb00:204... 2400:cb00:2048:1::681f:5307 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - CloudFlare) | |
5 | 95.101.90.225 95.101.90.225 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
8 | 2400:cb00:204... 2400:cb00:2048:1::681f:5207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - CloudFlare) | |
18 | 3 |
ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US)
fun-palast.club |
ASN20940 (AKAMAI-ASN1, US)
PTR: a95-101-90-225.deploy.akamaitechnologies.com
a248.e.akamai.net |
ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US)
fun-palast.club |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
fun-palast.club
fun-palast.club |
63 KB |
5 |
akamai.net
a248.e.akamai.net |
|
18 | 2 |
Domain | Requested by | |
---|---|---|
13 | fun-palast.club |
fun-palast.club
|
5 | a248.e.akamai.net |
fun-palast.club
|
18 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
a248.e.akamai.net Symantec Class 3 ECC 256 bit SSL CA - G2 |
2017-03-07 - 2018-05-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/ATMIdentity.html
Frame ID: 6795.1
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/session.cgisc... Page URL
- http://fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/ATMIdentity.html Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
Zepto (JavaScript Libraries) Expand
Detected patterns
- script /zepto.*\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/session.cgiscreenid=SIGNON.htm Page URL
- http://fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/ATMIdentity.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
session.cgiscreenid=SIGNON.htm
fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vudu.css
a248.e.akamai.net/7/248/3608/1b3a835ef5bb47/online.wellsfargo.com/das/common/styles/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wibscreen.css
a248.e.akamai.net/7/248/3608/bdc629093b5d70/online.wellsfargo.com/das/common/styles/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mm.css
a248.e.akamai.net/7/248/3608/62a56542b694b4/online.wellsfargo.com/das/common/styles/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wibcommon.js
fun-palast.club/das/common/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
user-prefs.js
fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/common/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkflash.js
fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/common/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_62sq.gif
a248.e.akamai.net/7/248/3608/bb61162e7a787f/online.wellsfargo.com/das/common/images/ |
321 B 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wibprint.css
a248.e.akamai.net/7/248/3608/2436e3a10d93f7/online.wellsfargo.com/das/common/styles/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkflash.js
fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/common/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
ATMIdentity.html
fun-palast.club/wp-includes/pomo/smart/wellssecure/wells/W/W/signon/wellsfargo/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.errors.css
fun-palast.club/cdn-cgi/styles/ |
28 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zepto.min.js
fun-palast.club/cdn-cgi/scripts/ |
24 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.common.js
fun-palast.club/cdn-cgi/scripts/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-exclamation.png
fun-palast.club/cdn-cgi/images/ |
512 B 512 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opensans-300.woff
fun-palast.club/cdn-cgi/styles/fonts/ |
15 KB 14 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opensans-400.woff
fun-palast.club/cdn-cgi/styles/fonts/ |
16 KB 14 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opensans-600.woff
fun-palast.club/cdn-cgi/styles/fonts/ |
16 KB 15 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.fun-palast.club/ | Name: __cfduid Value: d57923c1e9cdd38b328ffa5baa2432bfd1504731703 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a248.e.akamai.net
fun-palast.club
2400:cb00:2048:1::681f:5207
2400:cb00:2048:1::681f:5307
95.101.90.225
059fb5b9c3140723dd817f3e0a6dd38b62465864cc6922727ff23a4c4fb157a8
38d3578fac745f8a18cd8068a55f0c45d68c37532e2f85b98be69f32d8ab23ed
393c14162b5472e48358ba027ef7fc321d7761e6f4a86ea909b58ad9839177c4
8662216acfc2aebb92efb59860305bf049548c55dbf3c7507df48d36ec4ae09f
9278e2b6da81595fba191499aed6d9ac5d07a1a70ae95052d386bbbd31eee76d
9c3bbb9063324138ae52131d7c3f2cf2b9a92765efc675eb2c7d84f8076bc0ae
cdb3d0c8bdaa4ff0e4808dd9f53c33f0898fd934c3df605368b82a92c88ec049
e2dba22a9ee028e3aa09baa7c36e14c86effba2516862aad01019c06e757b375
ec93a1d0c2d43420c22c063b3b76f17289995b806a41af33680ab43407e426a9
f225a2bae9928c058b75d8c1dfffa7c8bd81c73b5bc7ce1c941fdf7120b5091d