visitbolton.com
Open in
urlscan Pro
109.75.161.150
Malicious Activity!
Public Scan
Submission: On May 30 via automatic, source openphish
Summary
This is the only time visitbolton.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 109.75.161.150 109.75.161.150 | 20860 (IOMART-AS) (IOMART-AS) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
5 | 104.19.197.151 104.19.197.151 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
22 | 3 |
ASN20860 (IOMART-AS, GB)
PTR: server.boltoncouncilwebteam.co.uk
visitbolton.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
visitbolton.com
visitbolton.com |
53 KB |
5 |
cloudflare.com
cdnjs.cloudflare.com |
107 KB |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
22 | 3 |
Domain | Requested by | |
---|---|---|
16 | visitbolton.com |
visitbolton.com
|
5 | cdnjs.cloudflare.com |
visitbolton.com
|
1 | www.sitepoint.com |
visitbolton.com
|
22 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://visitbolton.com/modules/field/theme/wellsfargo/step2.php
Frame ID: 6CA1A1AA187937F5691B5EBA32D77C0E
Requests: 22 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
step2.php
visitbolton.com/modules/field/theme/wellsfargo/ |
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0-beta1/ |
256 KB 78 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.validate.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/ |
45 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
additional-methods.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/ |
38 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.payment.js
cdnjs.cloudflare.com/ajax/libs/jquery.payment/1.3.2/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ws1.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ws6.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
secu.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
907 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf17.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
265 B 678 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf20.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf21.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf22.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
274 B 687 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf18.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
z5.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ws2.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ws3.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ws7.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
1015 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
canc.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
confirm.png
visitbolton.com/modules/field/theme/wellsfargo/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| $ function| jQuery function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
visitbolton.com
www.sitepoint.com
104.19.197.151
109.75.161.150
54.148.84.95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