williamfrankwoolsey.com
Open in
urlscan Pro
3.88.183.252
Malicious Activity!
Public Scan
Effective URL: http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/
Submission: On August 15 via automatic, source phishtank
Summary
This is the only time williamfrankwoolsey.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Landesbank Berlin (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 210.16.120.91 210.16.120.91 | 36351 (SOFTLAYER) (SOFTLAYER - SoftLayer Technologies Inc.) | |
2 10 | 3.88.183.252 3.88.183.252 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
10 | 89.106.184.28 89.106.184.28 | 5630 (WORLDLINE...) (WORLDLINE-GERMANY Atos Worldline SAS) | |
19 | 3 |
ASN36351 (SOFTLAYER - SoftLayer Technologies Inc., US)
mindtheneuron.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-3-88-183-252.compute-1.amazonaws.com
williamfrankwoolsey.com |
ASN5630 (WORLDLINE-GERMANY Atos Worldline SAS, DE)
kreditkarten-banking.lbb.de |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
lbb.de
kreditkarten-banking.lbb.de |
47 KB |
10 |
williamfrankwoolsey.com
2 redirects
williamfrankwoolsey.com |
56 KB |
2 |
mindtheneuron.com
1 redirects
mindtheneuron.com |
589 B |
19 | 3 |
Domain | Requested by | |
---|---|---|
10 | kreditkarten-banking.lbb.de |
williamfrankwoolsey.com
|
10 | williamfrankwoolsey.com |
2 redirects
williamfrankwoolsey.com
|
2 | mindtheneuron.com | 1 redirects |
19 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
kreditkarten-banking.lbb.de |
Subject Issuer | Validity | Valid | |
---|---|---|---|
kreditkarten-banking.lbb.de DigiCert SHA2 Extended Validation Server CA |
2018-02-05 - 2020-02-05 |
2 years | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/
Frame ID: 5C15A711CDE767D1CDFB6032A6860546
Requests: 19 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://mindtheneuron.com/ko
HTTP 301
http://mindtheneuron.com/ko/ Page URL
-
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/
HTTP 302
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714... HTTP 301
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
10 Outgoing links
These are links going to different origins than the main page.
Title: Anmelden / Login
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Hilfe
Search URL Search Domain Scan URL
Title: Kontakt
Search URL Search Domain Scan URL
Title: Hinweise
Search URL Search Domain Scan URL
Title: Nutzungsbedingungen
Search URL Search Domain Scan URL
Title: Impressum
Search URL Search Domain Scan URL
Title: Datenschutz
Search URL Search Domain Scan URL
Title: Passwort anfordern.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mindtheneuron.com/ko
HTTP 301
http://mindtheneuron.com/ko/ Page URL
-
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/
HTTP 302
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB HTTP 301
http://williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://mindtheneuron.com/ko HTTP 301
- http://mindtheneuron.com/ko/
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
mindtheneuron.com/ko/ Redirect Chain
|
118 B 349 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/ Redirect Chain
|
21 KB 22 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lbb.css
kreditkarten-banking.lbb.de/lbb/cas/css/ |
7 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Titellogo1.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
43 B 538 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LBB_login_links.gif
kreditkarten-banking.lbb.de/cust_img/berliner_spk/ |
59 B 479 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
metaarea.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
49 B 544 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Banklogo.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
43 B 537 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LBB_login_rechts.gif
kreditkarten-banking.lbb.de/cust_img/berliner_spk/ |
11 KB 11 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lbb.css
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Titellogo1.gif
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/img/lbb/ |
43 B 359 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
24 KB 24 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
meta.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
81 B 575 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
button.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
67 B 561 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
link.gif
kreditkarten-banking.lbb.de/lbb/cas/img/lbb/ |
67 B 562 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
metaarea.gif
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/img/lbb/ |
49 B 365 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.gif
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/img/lbb/ |
24 KB 24 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
meta.gif
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/img/lbb/ |
81 B 370 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
button.gif
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/img/lbb/ |
67 B 356 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
link.gif
williamfrankwoolsey.com/wordpress/wp-content/plugins/fighter/de/dispatch.do/lbbbt_PRELON=do&ref=0714_LBB/img/lbb/ |
67 B 356 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Landesbank Berlin (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| jsmenu function| blink function| normal1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
williamfrankwoolsey.com/ | Name: PHPSESSID Value: 32rnkavtl6pn7qn5vp8j0v0150 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kreditkarten-banking.lbb.de
mindtheneuron.com
williamfrankwoolsey.com
210.16.120.91
3.88.183.252
89.106.184.28
15927d426b35a3f891524be348e0205175d1efd4a74403985186f570ae7b7fc7
1cd58a827318c4a29b32a0db15c8c39d5651b42d8cad227519ad81bce4adb944
34e7d2a8a056c839bc78c85e05fb8f8a4989a94dd78697b6237ba15f749d0484
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
918eabacb055e7cf2ef8c1a2006f910874383910fb86b6457d26fece62d7aa65
b8db428a0d53deeaa8ff46ba403fb22afcb0e9ef754fafd1aee08957f58c856a
c7808138a4b8a00e35e54c062201202e9e5523a2af47b5f3f480a89929279182
dba31482c5758be14143eec2611b9bf10a06d7c5563a653b3ae7c75711c1f246
e5858ff621db27cd5758502badd950c14cdf8f4d7895f5b7d85c9ac01ef3a1c5
eb7ba4d393dafd34b34bac11e49683b533a60e25ac8ed7d67f17c7c43e2df327
f8ff5491f83963d4027ce74232bfabbcb7a089e5a8331282913ccb377d7a1186