royalblue.co.za
Open in
urlscan Pro
192.254.146.219
Malicious Activity!
Public Scan
Submission: On October 12 via automatic, source openphish
Summary
This is the only time royalblue.co.za was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 192.254.146.219 192.254.146.219 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 159.45.2.156 159.45.2.156 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
14 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: desertblue.co.za
royalblue.co.za |
ASN10837 (WELLSFARGO-10837, US)
connect.secure.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
royalblue.co.za
royalblue.co.za |
241 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
16 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
10 | royalblue.co.za |
royalblue.co.za
|
1 | connect.secure.wellsfargo.com |
royalblue.co.za
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://royalblue.co.za/wp-admin/includes/get/access/wells/wells.htm
Frame ID: 974A1A90BE02BB0AF495C8D48387D3C6
Requests: 14 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
wells.htm
royalblue.co.za/wp-admin/includes/get/access/wells/ |
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signonCommitment.css
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
8 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
144 KB 144 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wflogo-gfrewards.png
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.2.2.js
royalblue.co.za/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
royalblue.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
search_corner.gif
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
btn_blueslice.gif
royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
royalblue.co.za/wp-admin/includes/get/access/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- royalblue.co.za
- URL
- http://royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/images/search_corner.gif
- Domain
- royalblue.co.za
- URL
- http://royalblue.co.za/wp-admin/includes/get/access/wells/wells_files/images/btn_blueslice.gif
- Domain
- royalblue.co.za
- URL
- http://royalblue.co.za/wp-admin/includes/get/access/images/wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
royalblue.co.za
royalblue.co.za
159.45.2.156
192.254.146.219
1b1b1c060912cb94b0db47fb6740b14ca96f731b0f1125bae5130a83e92d5f07
248d37e6d3b2ca396b630adddb3dfc9b32ed188c2cb1582ac5497cd9909cf0e0
3313ac9f2c148df9dc8581ae4d7bb9023c3ef933d1152db47de29e32ec5f67b0
5fb7b85658a6e615400e0f1f3e16fc869bbd099b3c3c181c294c05d1d7d1cfe5
7c21a45f9e10b50948faf43421ae13f1a49c75c9e44604c63b9bd1c34075d474
8acab8f477754cb0846b2eca8bfea7c4e5a0e3a5348a3ff69fe67bfaef42b8ab
d6f76ea59773094b3e65e6dc7bb9bfd2659f79489c1d4942e403428e28ab4bc0
f82a7a512d314b7ce4c4bbab30c4528e0c3136514b694ca53213f06b246b273c
ffc539eb345f9466fecbe7b7ea8d2db0f56ef3857c8b26159d9a230bf9afdb4a