www.wagihabbas.com
Open in
urlscan Pro
198.57.149.75
Malicious Activity!
Public Scan
Submission: On December 21 via automatic, source openphish — Scanned from DE
Summary
This is the only time www.wagihabbas.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ANZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 198.57.149.75 198.57.149.75 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:3b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
3 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: cecilias-embroidery-designs.com
www.wagihabbas.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
wagihabbas.com
www.wagihabbas.com |
229 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 686 |
31 KB |
3 | 2 |
Domain | Requested by | |
---|---|---|
2 | www.wagihabbas.com |
www.wagihabbas.com
|
1 | code.jquery.com |
www.wagihabbas.com
|
3 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.anz.com.au |
www.recovery.anz.com |
login.anz.com |
register.anz.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.wagihabbas.com/what/loge/main/login.php
Frame ID: D566F0B0EF80CE0A8B6AE73470F4F673
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Login - ANZ Internet BankingDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
12 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Forgot login details?
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Title: Register
Search URL Search Domain Scan URL
Title: Security and Privacy Statement.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: What’s new
Search URL Search Domain Scan URL
Title: Find or change your CRN and Password
Search URL Search Domain Scan URL
Title: View statements
Search URL Search Domain Scan URL
Title: Get or change your card PIN
Search URL Search Domain Scan URL
Title: Latest security alerts
Search URL Search Domain Scan URL
Title: Contact us
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
www.wagihabbas.com/what/loge/main/ |
372 KB 229 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
38 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
11 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
52 KB 52 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
51 KB 51 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
51 KB 51 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 31 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
www.wagihabbas.com/js/anz/ |
0 186 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ANZ Bank (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| oncontentvisibilityautostatechange function| savepage_ShadowLoader function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.wagihabbas.com/ | Name: PHPSESSID Value: 54b36e9afd7587db1641aff4d1050dc0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
www.wagihabbas.com
198.57.149.75
2001:4de0:ac18::1:a:3b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