fa39f39db9.nxcli.net
Open in
urlscan Pro
209.87.149.244
Malicious Activity!
Public Scan
Submission: On November 05 via manual from US — Scanned from DE
Summary
This is the only time fa39f39db9.nxcli.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Charles Schwab (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 209.87.149.244 209.87.149.244 | 36444 (NEXCESS-NET) (NEXCESS-NET) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
14 | 2 |
ASN36444 (NEXCESS-NET, US)
PTR: cloudhost-3401834.us-midwest-1.nxcli.net
fa39f39db9.nxcli.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
nxcli.net
fa39f39db9.nxcli.net |
295 KB |
1 |
googleapis.com
ajax.googleapis.com |
84 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
13 | fa39f39db9.nxcli.net |
fa39f39db9.nxcli.net
|
1 | ajax.googleapis.com |
fa39f39db9.nxcli.net
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2021-10-18 - 2022-01-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://fa39f39db9.nxcli.net/css/chswb/index.html
Frame ID: 4E7B5414EC6601D1D9E1EAEA33607366
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
fa39f39db9.nxcli.net/css/chswb/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 84 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w1.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w2.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w3.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
548 B 807 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w4.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w8.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
67 KB 68 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w9.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
50 KB 50 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w10.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
102 KB 102 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w5.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w6.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w7.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
822 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cgh.png
fa39f39db9.nxcli.net/css/chswb/flaryio0/ |
888 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Preloader_11.html
fa39f39db9.nxcli.net/smallenvelop.com/wp-content/uploads/2014/08/ |
196 B 196 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Charles Schwab (Financial)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
fa39f39db9.nxcli.net
209.87.149.244
2a00:1450:4001:810::200a
006ef294fee1bdeaeb702b5b9fa608567d78a778bb89022da0716a387b40cf96
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
0f8eb71359d9f6ce908938646a706cc35ab0df5260b8c1f2be44b1d65015a6e8
21b31ff9cea1ad56c36e49ae2b8b9bac27e46d80d79539a3c2c11b328c971b72
3141d73f4bd394efcfb9f8984b0dc24f5e5519bfc662fbdf7b0913c105c5ccfc
4e31ce2fff3c5875c154e923c648d968b8f04b27135868cd6b4b7cf734193d8e
5f5615debca103a7b17df3e42563e24937decbfffec54432d244413fdf8a578c
6359c24246479b81cb4e98d84c0145b0a9761d44ade5264f97f7bbfe064730cf
80c3fe2ae1062abf56456f52518bd670f9ec3917b7f85e152b347ac6b6faf880
93dedc06a3e76dbaf73721a159c94f6982990bfc2572b9e916aa9e55d4dac7e7
bef2bc49fba65882c6b5394276011efee732f406455eb1221feb24a434cb0e16
c2ece77bbb4d73cc6a4b18cbb7809360d1fbc99c1e2ff5578ef77a270b9929b1
c3e192a2276a337351a8702a6684e4f1280d6dd432428a11b9e12783db9f521f
cc267e39af2d5135c985b97645d22844b7b0114d987fe4d9a72cc6b7eef474ff