royalblue.co.za
Open in
urlscan Pro
192.254.146.219
Malicious Activity!
Public Scan
Submission: On October 13 via api from QA
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 16th 2020. Valid for: 3 months.
This is the only time royalblue.co.za was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 192.254.146.219 192.254.146.219 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 159.45.2.156 159.45.2.156 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
15 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: desertblue.co.za
royalblue.co.za |
ASN10837 (WELLSFARGO-10837, US)
connect.secure.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
royalblue.co.za
royalblue.co.za |
244 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
17 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
13 | royalblue.co.za |
royalblue.co.za
|
1 | connect.secure.wellsfargo.com |
royalblue.co.za
|
15 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
royalblue.co.za cPanel, Inc. Certification Authority |
2020-08-16 - 2020-11-14 |
3 months | crt.sh |
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells.htm
Frame ID: BFCA3DA068A60B99F624BD2E4767BCF4
Requests: 15 HTTP requests in this frame
14 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Learn More
Search URL Search Domain Scan URL
Title: Frequently asked questions >
Search URL Search Domain Scan URL
Title: Email Security Help
Search URL Search Domain Scan URL
Title: www.wellsfargo.com/agreement
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
wells.htm
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/ |
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
nd
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signonCommitment.css
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
theme.css
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
8 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login-userprefs.js
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
144 KB 145 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
conutils-6.js
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
atadun.js
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wflogo-gfrewards.png
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/ |
20 KB 20 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
conutils-6.2.2.js
royalblue.co.za/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
atadun.js
royalblue.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
atadun.js
royalblue.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
search_corner.gif
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/images/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn_blueslice.gif
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/wells/wells_files/images/ |
344 B 344 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- royalblue.co.za
- URL
- https://royalblue.co.za/wp-admin/includes/get/access/WellsFargo/WellsFargo/images/wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)170 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| ndoGetObjectKeys string| ndjsStaticVersion object| nszvhlfa object| nsksabgo boolean| nspeimkxby number| nsoibexed number| nszvh object| nsepmaz object| nskstm object| nsoibexe object| nsoibe object| nsepm object| nskstmsip boolean| nskstms string| nszvhlf object| nds object| nsepmazt number| numQueries object| returned string| version undefined| nsksab string| nsvabseiis string| nsvabseii string| nsjudvctm string| nsepmaztj string| nsvabsei string| nsoib object| nsjudvct object| nszvhlfahn function| nsepma function| nspeimkx function| nskstmsipu boolean| nszvhl object| nsjudvc function| nsepmaztjz function| nskstmsi function| nspei function| nsoibex function| nskst function| nsksa function| nspeimkxb function| nspeim function| nsksabg function| nsvabse function| nsksabgokg function| nsoibexedn function| nsvab function| ndwts function| HashUtil function| nsksabgok function| nsjud function| nsjudv function| nsjudvctmh function| nsvabs function| nspeimk function| nszvhlfah function| nszrnjziw function| nsoao function| nsnapiox function| ndwti function| nsulno function| nsnapioxjn function| nssylksok function| nsoaoetz function| nszrnj function| nswkoligw function| nsuln function| nsulnoxyfy function| nsoaoetzh function| nswko function| nserngs function| nsnapioxj object| ndsapi object| antiClickjack string| webId string| ndURI object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged boolean| m object| q object| options object| lun3 boolean| isNative object| js object| fjs boolean| nsorybxl function| nsfpxc object| nsnkagaab object| nsfpxcf boolean| nstik number| nsuxmj function| nsuxmjushi number| nsfpxcfxj object| nsuxmju object| nsmlrcodfo object| nswwl object| nsuxmjus object| nswwls function| nsnkag function| nsfjyqcsz object| nsmlr boolean| nsorybxln string| nswwlsiv function| nsory string| nsnkagaa function| nsuxm string| nsmlrco function| nsfjy string| nsoryb function| nstikn string| nsnkagaabo string| nstiknsl function| nswwlsivsp string| nsfjyq string| nstiknslpc string| nsorybx object| nsfpxcfx function| nstikns function| nsmlrc object| nsuxmjush function| nsfjyqc function| nsmlrcod function| nstiknslp function| nsnka function| nsfpx function| nsfpxcfxjm function| nsfjyqcs function| nsfjyqcszb function| nsnkaga function| nsorybxlng function| nswwlsivs function| nsmlrcodf function| nsacjl function| nsfgvcdyxn function| nsbixkhert function| nscilylbfq function| nsacjlxgkt function| nslzhe function| nscilylbf function| nsfgvcdyx function| nsgppdbfn function| nsahoeufi function| nsfgvcdy function| nslzh function| nsbixkhe function| nsacj function| nscil function| nslzheayn function| nsaho function| nsbix function| nsbixkh object| nswwlsi function| nsfgvcd function| validateSessionIdCookie function| nsgppdb function| nsahoe1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.royalblue.co.za/ | Name: ndsid Value: ndsav2g0iet8znmkg7cfym8 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
royalblue.co.za
royalblue.co.za
159.45.2.156
192.254.146.219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