greatnorthsteam.com
Open in
urlscan Pro
2606:4700:3033::681b:ba69
Malicious Activity!
Public Scan
Submission: On June 27 via automatic, source phishtank
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on May 15th 2020. Valid for: 5 months.
This is the only time greatnorthsteam.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 2606:4700:303... 2606:4700:3033::681b:ba69 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
greatnorthsteam.com
greatnorthsteam.com |
902 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
3 | greatnorthsteam.com |
greatnorthsteam.com
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-05-15 - 2020-10-09 |
5 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://greatnorthsteam.com/WELLD/ebwells/
Frame ID: B9F5CEFDCAED97518B3FD5FA45D94F20
Requests: 3 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
greatnorthsteam.com/WELLD/ebwells/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logbt.jpg
greatnorthsteam.com/WELLD/ebwells/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellunder.jpg
greatnorthsteam.com/WELLD/ebwells/ |
893 KB 894 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
greatnorthsteam.com
2606:4700:3033::681b:ba69
1c76f49c1cc363539390388d254dd856f393af5a5105dffd7b6a063f7601a76f
8543a171a5424e54a2cd522280622d8540c2d4bcf433944c351451a68c5b7318
ace6c5a8b98b0e172ce00ad3350b660ed271c6ebb65b38ef8917db9156a30c22