www04-auth-fidelity-session.duckdns.org
Open in
urlscan Pro
64.227.12.46
Malicious Activity!
Public Scan
Submission: On September 16 via automatic, source openphish — Scanned from DE
Summary
This is the only time www04-auth-fidelity-session.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fidelity (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 64.227.12.46 64.227.12.46 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
3 | 45.63.85.138 45.63.85.138 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 2.18.232.194 2.18.232.194 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
10 | 4 |
ASN14061 (DIGITALOCEAN-ASN, US)
www04-auth-fidelity-session.duckdns.org |
ASN20473 (AS-CHOOPA, US)
PTR: 45.63.85.138.vultr.com
files.killbot.org | |
killbot.org |
ASN16625 (AKAMAI-AS, US)
PTR: a2-18-232-194.deploy.static.akamaitechnologies.com
sjc1.qualtrics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
duckdns.org
www04-auth-fidelity-session.duckdns.org |
254 KB |
3 |
killbot.org
files.killbot.org killbot.org |
5 KB |
1 |
qualtrics.com
sjc1.qualtrics.com |
2 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
6 | www04-auth-fidelity-session.duckdns.org |
www04-auth-fidelity-session.duckdns.org
|
2 | killbot.org |
files.killbot.org
|
1 | sjc1.qualtrics.com |
www04-auth-fidelity-session.duckdns.org
|
1 | files.killbot.org |
www04-auth-fidelity-session.duckdns.org
|
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
files.killbot.org R3 |
2021-08-07 - 2021-11-05 |
3 months | crt.sh |
*.qualtrics.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-05-04 - 2022-02-10 |
9 months | crt.sh |
killbot.org R3 |
2021-08-08 - 2021-11-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www04-auth-fidelity-session.duckdns.org/log4.php?03ioGJw5Am0MoDwmvAQclOaKVW3NcKZkXFrx3MIJal9xtKijFH615nOBaFMw6ZKhupFygmvTnx553BM7d8EoNKaT7KXNm7mKg1QXhE45CaHzAoqQLT48cGMgA70JDnK4ZrVRdJe6843YJOBFxXjYi4
Frame ID: 077D834B0CCC41106F8EC8C84D1E5E80
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
FidelityDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
log4.php
www04-auth-fidelity-session.duckdns.org/ |
25 KB 26 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
killbot-security.js
files.killbot.org/.cdn-cgi/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www04-auth-fidelity-session.duckdns.org/assets/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.6.0.min.js
www04-auth-fidelity-session.duckdns.org/assets/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Graphic.php
sjc1.qualtrics.com/WRQualtricsSiteIntercept/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
whois
killbot.org/api/v2/ |
265 B 1021 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
585 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FidelitySans-Regular.woff2
www04-auth-fidelity-session.duckdns.org/assets/ |
38 KB 38 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
129 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FidelitySans-Light.woff2
www04-auth-fidelity-session.duckdns.org/assets/ |
40 KB 40 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FidelitySans-Bold.woff2
www04-auth-fidelity-session.duckdns.org/assets/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
266 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blocker
killbot.org/api/v2/ |
146 B 911 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fidelity (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| _0x3185 function| _0x501f function| _0x34aede function| $ function| jQuery function| phoneFormatter function| isInteger0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
files.killbot.org
killbot.org
sjc1.qualtrics.com
www04-auth-fidelity-session.duckdns.org
2.18.232.194
45.63.85.138
64.227.12.46
13f7de72970d9a3b94fcc44a294dc8159489be5195d477a95fa85a026b38242c
170c22b59d68deed748cc0b577f49a828d751cb5b201fabee8f5b2eb515d4998
261810b2a67fd59ab5e89584961e97a6ba419d5db0811ee5baf8b98affb49aa0
39aac9dc37e49220013d6bfda6483629e9658764582168758db8cf4426b25db0
4f0fb3dce4779c87ed2ac21db681d3d692f7f0577722ff3cde024bd8c1740c56
54a2d90936b4c21fc34a4b909368f4e04f4ab9febe75bb7c1b36c84978c7f1a3
5567ea701e0a8d0d61ac9f7d6822ade38ca9399d78916df220b90860d1d6d57d
662294921ca6240beb0f2aecb7f7ac23dd085b782bbe52a369b20226d26afe33
67c80d56758cda1bb5bec77917aaf74c32006a0bc09a7dd164c556de2c754487
6b2ced9a0548a82ecb57df60ab6d1ca8ac7e7584f64f2b9e64cbf4ad0c3483a4
7a407e54294c6ef2fe14317f6653ff26f73749e20d8c8e53a4016f822a5024fe
7aa0292c8b5387df9165be7dec812d4636f0848f97093801e7c0d2d89d0ce62b
9999f5dbf899307d8d9a37abda49b26efcfc6a7dd56cb09d2c172aa4093955f1
ad991f7f9429c45922f64e9958aae62257b417a2b810c8d82d4fef4cdd424666
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e