attiaphoto.com
Open in
urlscan Pro
64.22.104.143
Malicious Activity!
Public Scan
Submission: On April 13 via automatic, source openphish
Summary
This is the only time attiaphoto.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 64.22.104.143 64.22.104.143 | 3595 (GNAXNET-AS) (GNAXNET-AS - Global Net Access) | |
1 | 104.108.68.65 104.108.68.65 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
4 | 3 |
ASN3595 (GNAXNET-AS - Global Net Access, LLC, US)
PTR: server.bluebweb.com
attiaphoto.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-108-68-65.deploy.static.akamaitechnologies.com
www01.wellsfargomedia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
attiaphoto.com
attiaphoto.com |
7 KB |
1 |
wellsfargomedia.com
www01.wellsfargomedia.com |
15 KB |
4 | 2 |
Domain | Requested by | |
---|---|---|
3 | attiaphoto.com |
attiaphoto.com
|
1 | www01.wellsfargomedia.com |
attiaphoto.com
|
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://attiaphoto.com/wellsfargo/m.wellsfargo.com/identifyuser.php?f4a55601b3bca855460a77ee7dd19e76
Frame ID: 918001C184F25FB58B2B79EDCED3529
Requests: 5 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
identifyuser.php
attiaphoto.com/wellsfargo/m.wellsfargo.com/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
smartphone-home.css
www01.wellsfargomedia.com/css/mobile/ |
56 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tgo.svg
attiaphoto.com/wellsfargo/m.wellsfargo.com/img/ |
897 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
attiaphoto.com/wellsfargo/m.wellsfargo.com/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
758 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
attiaphoto.com
www01.wellsfargomedia.com
104.108.68.65
64.22.104.143
3caf9d903451cad35392e207177b9a7eee3e00defcdaf2345246484bc7b557a2
9476d2ec1a38d5fab5cb783028444dbb9ebbe9241de0959f167f8e01b4c1f971
d4064f419090460be6eed2641bdfd52e10d557bdfb481c1aac16a089be1df371
d5a70f288ab7bc79e3a028954241cc0aa5b3bd4bb0bdb5e13f7c43209e2d0f70
f176d48cef265952c32dc93b36ff7ed1fdf611f28c44b07c9682ce7355725504