fidelity-test.duckdns.org Open in urlscan Pro
182.160.12.148  Malicious Activity! Public Scan

URL: https://fidelity-test.duckdns.org/
Submission: On December 14 via automatic, source certstream-suspicious — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 182.160.12.148, located in Hong Kong, Hong Kong and belongs to HWCLOUDS-AS-AP HUAWEI CLOUDS, HK. The main domain is fidelity-test.duckdns.org.
TLS certificate: Issued by R10 on December 14th 2024. Valid for: 3 months.
This is the only time fidelity-test.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Fidelity (Banking)

Domain & IP information

IP Address AS Autonomous System
1 182.160.12.148 136907 (HWCLOUDS-...)
1 2
Apex Domain
Subdomains
Transfer
1 duckdns.org
fidelity-test.duckdns.org
653 KB
1 1
Domain Requested by
1 fidelity-test.duckdns.org
1 1

This site contains links to these domains. Also see Links.

Domain
www.fidelity.com
digital.fidelity.com
Subject Issuer Validity Valid
fidelity-test.duckdns.org
R10
2024-12-14 -
2025-03-14
3 months crt.sh

This page contains 1 frames:

Primary Page: https://fidelity-test.duckdns.org/
Frame ID: 996B0B81465E52CEEB738A8AF12ED6B2
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Log in to Fidelity

Detected technologies

Overall confidence: 100%
Detected patterns

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

726 kB
Transfer

1105 kB
Size

2
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
fidelity-test.duckdns.org/
1 MB
653 KB
Document
General
Full URL
https://fidelity-test.duckdns.org/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
182.160.12.148 Hong Kong, Hong Kong, ASN136907 (HWCLOUDS-AS-AP HUAWEI CLOUDS, HK),
Reverse DNS
ecs-182-160-12-148.compute.hwclouds-dns.com
Software
nginx /
Resource Hash
99bef7a85f7f76082075cddfe1e313fc81075924b6f6a06e49a175e923f920ae
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

cache-control
public
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Sat, 14 Dec 2024 08:33:56 GMT
last-modified
Sat, 14 Dec 2024 08:33:52 GMT
server
nginx
strict-transport-security
max-age=31536000
vary
Accept-Encoding
truncated
/
38 KB
38 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7a407e54294c6ef2fe14317f6653ff26f73749e20d8c8e53a4016f822a5024fe

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Origin
https://fidelity-test.duckdns.org
Referer

Response headers

Content-Type
font/woff2
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4a1410b4f4c92b57d938e22d6418dc173b4661805a231fdc567d357790ccebf8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
261810b2a67fd59ab5e89584961e97a6ba419d5db0811ee5baf8b98affb49aa0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
35 KB
35 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
67c80d56758cda1bb5bec77917aaf74c32006a0bc09a7dd164c556de2c754487

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Origin
https://fidelity-test.duckdns.org
Referer

Response headers

Content-Type
font/woff2

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Fidelity (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4

2 Cookies

Domain/Path Name / Value
fidelity-test.duckdns.org/ Name: XSRF-TOKEN
Value: eyJpdiI6IlRnYU83WXRtMTlOb0tsb1V3anZMWVE9PSIsInZhbHVlIjoidW9Vb1hLYXBSTVoweWUvYkhnTnlEL3lQdGFIeEFJQU5UU1pQNmtxN0x3OUN5REdPTGs4cE1IZUZkRmV2RkJjenBwV2FuRHRkWWN6Nm1qNnFqMmVYc3JSbHUyRm1ZOVNBVXVqZlFSanFVQkhyOXhDZWcrTFhBWFdoSEM2c05BRngiLCJtYWMiOiIwN2VhNzg2ODBiOTE2ZGVjNjkxODZkNjAxNmIyNjNjYzUwNjVjMTBlMzNiNmEyNzRkYjZiNDMwOTFjODI5MmY1IiwidGFnIjoiIn0%3D
fidelity-test.duckdns.org/ Name: laravel_session
Value: eyJpdiI6IjZOZCtRVTAwMGFiZk9FWjRvei90blE9PSIsInZhbHVlIjoiRG9ROThMNUpKMUp6bHEzakV2OWRJcDd2NFZwZloyS0FHbzdxYktodTdFYUh2VjBXRG1FSWQ2aVRmYTg1K1oyKzYvTy9iNDBuOVNqOVdtV1N5L3lxRmpkTjdXZ0ZQRFlGa3BCTEUwNXhqY1NucWN3Z1E1elhmdUk3aXZBeDNlQkciLCJtYWMiOiI0ZGE0NGI3ZGM2OWNlYWYzYTM0YzdjNDYzYjM1YjcxMWJiMTlhMzg4N2VhMjJiMDZmMzU3OThmZjRkNTdkOTU1IiwidGFnIjoiIn0%3D

1 Console Messages

Source Level URL
Text
security warning URL: about:blank
Message:
An iframe which has both allow-scripts and allow-same-origin for its sandbox attribute can escape its sandboxing.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000