wellsfargo-fraud-alert.com Open in urlscan Pro
193.106.191.135  Malicious Activity! Public Scan

Submitted URL: https://wellsfargo-fraud-alert.com/
Effective URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfw...
Submission: On November 11 via automatic, source certstream-suspicious — Scanned from DE

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 12 HTTP transactions. The main IP is 193.106.191.135, located in Krasnoyarsk, Russian Federation and belongs to KANZAS-AS, RU. The main domain is wellsfargo-fraud-alert.com.
TLS certificate: Issued by R3 on November 11th 2022. Valid for: 3 months.
This is the only time wellsfargo-fraud-alert.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
1 5 193.106.191.135 59940 (KANZAS-AS)
1 2606:4700:303... 13335 (CLOUDFLAR...)
5 2606:4700::68... 13335 (CLOUDFLAR...)
2 23.203.89.234 16625 (AKAMAI-AS)
12 4
Apex Domain
Subdomains
Transfer
5 cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 201
90 KB
5 wellsfargo-fraud-alert.com
wellsfargo-fraud-alert.com
736 KB
2 wellsfargomedia.com
www15.wellsfargomedia.com — Cisco Umbrella Rank: 26356
45 KB
1 killbot.org
files.killbot.org
12 4
Domain Requested by
5 cdnjs.cloudflare.com wellsfargo-fraud-alert.com
5 wellsfargo-fraud-alert.com 1 redirects wellsfargo-fraud-alert.com
2 www15.wellsfargomedia.com wellsfargo-fraud-alert.com
1 files.killbot.org wellsfargo-fraud-alert.com
12 4

This site contains no links.

Subject Issuer Validity Valid
wellsfargo-fraud-alert.com
R3
2022-11-11 -
2023-02-09
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-06-29 -
2023-06-28
a year crt.sh
www15.wellsfargomedia.com
DigiCert SHA2 Secure Server CA
2021-12-31 -
2023-01-03
a year crt.sh

This page contains 1 frames:

Primary Page: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Frame ID: 8D016D38E98D9495EA266F0071FBA30A
Requests: 12 HTTP requests in this frame

Screenshot

Page Title

Sign On to View Your Personal Accounts | Wells Fargo

Page URL History Show full URLs

  1. https://wellsfargo-fraud-alert.com/ HTTP 302
    https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lU... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

12
Requests

100 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

870 kB
Transfer

1144 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://wellsfargo-fraud-alert.com/ HTTP 302
    https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

12 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
wellsfargo-fraud-alert.com/
Redirect Chain
  • https://wellsfargo-fraud-alert.com/
  • https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
14 KB
14 KB
Document
General
Full URL
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
364eeffc999b466cd0df7f484d74b6473ba3a15cb0f919056a4333ee6e3d58ea

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Fri, 11 Nov 2022 16:17:13 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive
timeout=5, max=99
Pragma
no-cache
Server
Apache
Transfer-Encoding
chunked

Redirect headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Content-Length
0
Content-Type
text/html; charset=UTF-8
Date
Fri, 11 Nov 2022 16:17:13 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive
timeout=5, max=100
Pragma
no-cache
Server
Apache
location
login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
killbot-security.js
files.killbot.org/.cdn-cgi/
0
0
Script
General
Full URL
https://files.killbot.org/.cdn-cgi/killbot-security.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3030::6815:ba0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

wfui.4bdda2282747ed96f876.chunk.css
wellsfargo-fraud-alert.com/file/
98 KB
98 KB
Stylesheet
General
Full URL
https://wellsfargo-fraud-alert.com/file/wfui.4bdda2282747ed96f876.chunk.css
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
7918205c0c27d2ca0960c54c9c25709ee997294843c5ca2fdde64e6e2f2459a0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Fri, 11 Nov 2022 16:17:13 GMT
Last-Modified
Thu, 17 Feb 2022 03:21:14 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
100499
main.b3b5f355e18c2c42a801.chunk.css
wellsfargo-fraud-alert.com/file/
12 KB
12 KB
Stylesheet
General
Full URL
https://wellsfargo-fraud-alert.com/file/main.b3b5f355e18c2c42a801.chunk.css
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
5e68ea9ca9cce32f91979f88142e963f0ff950cc1f1b6c3246eaaaf2f3091c58

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Fri, 11 Nov 2022 16:17:13 GMT
Last-Modified
Thu, 17 Feb 2022 03:21:14 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
11856
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0-beta1/
256 KB
64 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0-beta1/jquery.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
78f27c3d7cb5d766466703adc7f7ad7706b7fb05514eec39be0aa253449bd0f8
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 16:17:13 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
67489
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
64839
last-modified
Mon, 04 May 2020 16:11:48 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec4-40023"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=Zk6bxcvqIvYk3uJa6uMNJfRQ8v5jc%2B4JWvBHeG%2Bc7IAT7dkGXt3ZhosXQEZjVds6POBFXoS6QvB1Kxg6p0OgC9GPHC9EmRHXR%2FWIGFd4NTXKWqhB9REkPH%2Bh40NDUKGENU1PkkEYaFO0v9vTzfTAL7br"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
7688563cdedc920d-FRA
expires
Wed, 01 Nov 2023 16:17:13 GMT
jquery.validate.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/
45 KB
11 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/jquery.validate.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2aecc3e7494318d2398eafe2a6de21c03a52264ddf86c7934758ddbda06864bb
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 16:17:13 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
6873443
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
10622
last-modified
Mon, 04 May 2020 16:11:46 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec2-b4b9"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=hdqsxnIVRcnupvzCOsipZZ7Ca%2BKHMGPYvHfTe5XkJJuOyWAN1cm3xH%2B3xfwAISuex35Onaa95%2BiPMCjoPwdVoOwLmmtxmy%2FKiSXslCWDUy2a933EFnmV6Yx9eCot4FFX3W%2FX%2F0u0j2fYAVbJNuIS3nj4"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
7688563cdede920d-FRA
expires
Wed, 01 Nov 2023 16:17:13 GMT
additional-methods.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/
38 KB
9 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/additional-methods.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1d95e0e21c160558eb3d2bacd76779048cb600cc04e15264e0835f4f86b4b375
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 16:17:13 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
25079673
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
9078
last-modified
Mon, 04 May 2020 16:11:46 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec2-985d"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=14UMvOvJx48xw0%2BTnSaTIZPEE4t3RVe39uVE7bty4cXdjJxopjDAWeG34qCJNP0h%2B5lWVyQWCtl2QXInvpDroLyvxvGVTITAKi9oKI5pz63qABNwpAm1xaaHYYMkUkLcjf8WbdFi7VbHTAGgrzCEjA%2Fd"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
7688563cdedf920d-FRA
expires
Wed, 01 Nov 2023 16:17:13 GMT
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/
10 KB
3 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/jquery.maskedinput.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 16:17:13 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
813667
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
2306
last-modified
Mon, 04 May 2020 16:11:47 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec3-284d"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=RPj%2FXm%2BrUK5lkCCFEjuXsun8yy%2FfLzAxcvx18ampUGz0n1xSgoOCUcp9l%2BT7Ht0PfvECjmZ5UyMQIEk7muugu%2BKGoqIAq%2FZIg8exjhluPjhtqcHnTrKwpSihyGl%2FFibOWN7K%2FJFoBrb%2FT5u6A6Ixxtbi"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
7688563cdee3920d-FRA
expires
Wed, 01 Nov 2023 16:17:13 GMT
jquery.payment.js
cdnjs.cloudflare.com/ajax/libs/jquery.payment/1.3.2/
17 KB
3 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery.payment/1.3.2/jquery.payment.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
60499c4335239d51fa6ef40bd909ba8e62a2a468b16b74f0fd9fadac1eee4bbf
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

date
Fri, 11 Nov 2022 16:17:13 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
252554
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
3067
last-modified
Mon, 04 May 2020 16:11:47 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec3-421b"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=pAKd3PpfN3hEFIdu1os5schrVDXJcj1WnH8muuUKIbIh2k2RpTHL%2FaNgyngRlp%2BD91q4hDnqdlYrPgO8v7JgzBhlF6Y2N%2Fo2VH8GYce15S0pbUHhnw1gCCduuWiuBwB4WiM1rb8qocWkjQQirkyeRr9U"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
7688563cdee0920d-FRA
expires
Wed, 01 Nov 2023 16:17:13 GMT
COB-BOB-IRT-enroll_balloons.jpg
wellsfargo-fraud-alert.com/file/
611 KB
611 KB
Image
General
Full URL
https://wellsfargo-fraud-alert.com/file/COB-BOB-IRT-enroll_balloons.jpg
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
b8325d272c72a041414d9fb349e9d4bca5e7fc8ad66f47a719e491960afa5683

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=4A5rLZydlw75KOlPXuWcXDR3SphwtADgsvrNhjqGmCccNa0lUKMA89fhINe4SPxHSoIfwliqurXGzCmIdRv1hGwNxCnOm2UuLDsz7QFE7NGlmTqk2QzEmLk31U5XCbuQlU
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

Date
Fri, 11 Nov 2022 16:17:13 GMT
Last-Modified
Thu, 17 Feb 2022 03:21:48 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
625433
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/
22 KB
22 KB
Font
General
Full URL
https://www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-rg.woff2
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/file/wfui.4bdda2282747ed96f876.chunk.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.203.89.234 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-203-89-234.deploy.static.akamaitechnologies.com
Software
KONICHIWA/2.0 /
Resource Hash
631f3b6267a831a8d67c45e480b5d5a2601f10ff8708bcf3a45a41b377a129cc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://wellsfargo-fraud-alert.com/
Origin
https://wellsfargo-fraud-alert.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

unused62
8096267
strict-transport-security
max-age=31536000; includeSubdomains;
date
Fri, 11 Nov 2022 16:17:15 GMT
x-content-type-options
nosniff
last-modified
Tue, 26 Feb 2019 19:38:34 GMT
server
KONICHIWA/2.0
etag
"5798-582d133e56280"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
content-length
22424
x-xss-protection
1; mode=block
expires
Sat, 11 Nov 2023 16:17:15 GMT
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/
22 KB
22 KB
Font
General
Full URL
https://www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-sbd.woff2
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/file/wfui.4bdda2282747ed96f876.chunk.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.203.89.234 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-203-89-234.deploy.static.akamaitechnologies.com
Software
KONICHIWA/2.0 /
Resource Hash
ab9d8c97b35ed86b6224aca911aa304a0d7dbcbd28e00a4c6585b96e28ed30ba
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://wellsfargo-fraud-alert.com/
Origin
https://wellsfargo-fraud-alert.com
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.110 Safari/537.36

Response headers

unused62
8096267
strict-transport-security
max-age=31536000; includeSubdomains;
date
Fri, 11 Nov 2022 16:17:15 GMT
x-content-type-options
nosniff
last-modified
Tue, 26 Feb 2019 19:38:34 GMT
server
KONICHIWA/2.0
etag
"5848-582d133e56280"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
content-length
22600
x-xss-protection
1; mode=block
expires
Sat, 11 Nov 2023 16:17:15 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
wellsfargo-fraud-alert.com/ Name: PHPSESSID
Value: 3f8c571792f0224a2aa3d86d1c44f84f

1 Console Messages

Source Level URL
Text
network error URL: https://files.killbot.org/.cdn-cgi/killbot-security.js
Message:
Failed to load resource: the server responded with a status of 404 ()