wellsfargo.tronxpay.com
Open in
urlscan Pro
207.180.195.136
Malicious Activity!
Public Scan
Submission: On January 31 via automatic, source openphish — Scanned from DE
Summary
This is the only time wellsfargo.tronxpay.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Coinbase (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 207.180.195.136 207.180.195.136 | 51167 (CONTABO) (CONTABO) | |
2 | 52.57.40.68 52.57.40.68 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:827::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2a00:1450:400... 2a00:1450:4001:82f::2003 | 15169 (GOOGLE) (GOOGLE) | |
18 | 4 |
ASN51167 (CONTABO, DE)
PTR: linux4.gipdns.com
wellsfargo.tronxpay.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-57-40-68.eu-central-1.compute.amazonaws.com
htek4iohdq.js-delivr.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
tronxpay.com
wellsfargo.tronxpay.com |
1 MB |
3 |
gstatic.com
fonts.gstatic.com |
47 KB |
2 |
js-delivr.com
htek4iohdq.js-delivr.com |
18 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 34 |
2 KB |
18 | 4 |
Domain | Requested by | |
---|---|---|
12 | wellsfargo.tronxpay.com |
wellsfargo.tronxpay.com
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | htek4iohdq.js-delivr.com |
wellsfargo.tronxpay.com
htek4iohdq.js-delivr.com |
1 | fonts.googleapis.com |
wellsfargo.tronxpay.com
|
18 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.js-delivr.com Amazon |
2022-06-15 - 2023-07-13 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-01-09 - 2023-04-03 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-01-09 - 2023-04-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://wellsfargo.tronxpay.com/
Frame ID: BA96EDA287D8D5B7F088DA6E42029990
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
wellsfargoDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
wellsfargo.tronxpay.com/ |
1 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
analytics.js
htek4iohdq.js-delivr.com/js/hv6ic/ |
48 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
all.min.css
wellsfargo.tronxpay.com/assets/css/ |
58 KB 58 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
wellsfargo.tronxpay.com/assets/css/ |
157 KB 157 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.css
wellsfargo.tronxpay.com/assets/css/ |
10 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.a6833112.js
wellsfargo.tronxpay.com/static/js/ |
255 KB 256 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.d051e469.css
wellsfargo.tronxpay.com/static/css/ |
45 KB 46 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.5.1.min.js
wellsfargo.tronxpay.com/assets/js/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
popper.js
wellsfargo.tronxpay.com/assets/js/ |
512 KB 512 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
wellsfargo.tronxpay.com/assets/js/ |
62 KB 62 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
57 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
analytics.js
htek4iohdq.js-delivr.com/ejs/hv6ic/ |
0 219 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf_logo.webp
wellsfargo.tronxpay.com/images/ |
2 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search.png
wellsfargo.tronxpay.com/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmYUtfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner-home.webp
wellsfargo.tronxpay.com/assets/images/ |
22 KB 22 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Coinbase (Crypto Exchange)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange object| deployJava function| Detector function| murmurhash3_32_gc object| swfobject function| docReady function| ClientJS function| UAParser function| $ function| jQuery object| bootstrap function| preventBack object| webpackChunkwellsfargo0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
htek4iohdq.js-delivr.com
wellsfargo.tronxpay.com
207.180.195.136
2a00:1450:4001:827::200a
2a00:1450:4001:82f::2003
52.57.40.68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