vynam.com
Open in
urlscan Pro
162.251.84.196
Public Scan
Submission: On March 08 via automatic, source openphish
Summary
This is the only time vynam.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 162.251.84.196 162.251.84.196 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY - PDR) | |
22 | 2 |
ASN394695 (PUBLIC-DOMAIN-REGISTRY - PDR, US)
vynam.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
vynam.com
vynam.com |
506 KB |
0 |
wellsfargo.com
Failed
connect.secure.wellsfargo.com Failed |
|
0 |
Failed
function sub() { [native code] }. Failed |
|
22 | 3 |
Domain | Requested by | |
---|---|---|
14 | vynam.com |
vynam.com
|
0 | connect.secure.wellsfargo.com Failed |
vynam.com
|
0 | web Failed |
vynam.com
|
22 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://vynam.com/image/catalog/demo/mjpg/wellsfargo/verify1.html
Frame ID: (1831C34BA6A2C0DBA1B73DE48A9BD0F7)
Requests: 25 HTTP requests in this frame
Screenshot
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
verify1.html
vynam.com/image/catalog/demo/mjpg/wellsfargo/ |
17 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Offers.egain
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
47 KB 47 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proactive-chat.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
utag_004.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
471 B 737 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
36 KB 36 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
143 KB 144 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.css
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
78 KB 79 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
desktop-tablet.css
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
141 KB 141 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_010.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
wf-logo.gif
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
150 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
desktop-tablet.js
vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
egofrrulesengine.js
web/view/proactivesales/templates/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
egpsserviceshookdef.js
web/view/proactivesales/templates/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
conutils-6.2.2.js
vynam.com/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
atadun.js
vynam.com/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
nd
connect.secure.wellsfargo.com/jenny/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
903 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
collapsible-header.png
vynam.com/assets/images/osmp/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg-footer.png
vynam.com/assets/images/osmp/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- vynam.com
- URL
- http://vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/utag_004.js
- Domain
- vynam.com
- URL
- http://vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/wf-logo.gif
- Domain
- vynam.com
- URL
- http://vynam.com/image/catalog/demo/mjpg/wellsfargo/index_files/desktop-tablet.js
- Domain
- web
- URL
- http://web/view/proactivesales/templates/egofrrulesengine.js?patch_no=15.0.5.2.85868.0.4
- Domain
- web
- URL
- http://web/view/proactivesales/templates/egpsserviceshookdef.js?patch_no=15.0.5.2.85868.0.4
- Domain
- connect.secure.wellsfargo.com
- URL
- https://connect.secure.wellsfargo.com/jenny/nd
- Domain
- vynam.com
- URL
- http://vynam.com/assets/images/osmp/collapsible-header.png
- Domain
- vynam.com
- URL
- http://vynam.com/assets/images/osmp/bg-footer.png
Verdicts & Comments Add Verdict or Comment
81 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| eGOFR object| el function| ndoGetObjectKeys string| ndjsStaticVersion object| nspsyeno object| nspsye boolean| nsngvg number| nsngvgmben number| nsounandeo object| nsounand object| nssmwo object| nsowvr object| nsmjpw object| nsowvrhft object| nskghi number| nskghieg string| nsowvrhftn object| nds object| nssmw number| numQueries object| returned string| version undefined| nssmwouqk string| nsfyddd string| nsngvgmbe string| nsowv string| nssmwouqkl string| nsoun function| nsmjp function| nskghiego function| nssmwou boolean| nssmwouq object| nsowvrhf function| nspsyenoe function| nsmjpwy function| nsmjpwynh function| nsounande function| nsmjpwyn function| nsouna function| nsngvgmb function| nsfyd function| nsounan function| nspsyenoer function| nsfydddvc function| nsmjpwynhe function| nsfydddv function| nsfydddvcr function| nsngvgm function| nsfydd function| nspsy function| nskgh function| nsowvrh function| nskghiegoh function| nsngv function| nspsyen function| nskghie function| HashUtil function| nsudcyy function| nsktdutxxw function| nstqrnjxx function| rot13 function| nstqrnjx function| ndwts function| nsdkqatco function| nsudcyyzu function| nsdkq function| ndwti object| ndsapi object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged object| EGAINCLOUD0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
vynam.com
web
connect.secure.wellsfargo.com
vynam.com
web
162.251.84.196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