gotayflor.com
Open in
urlscan Pro
192.232.198.171
Malicious Activity!
Public Scan
Effective URL: https://gotayflor.com/images/online/www.wellsfargo.com/
Submission: On May 18 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 17th 2018. Valid for: 3 months.
This is the only time gotayflor.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 181.214.31.79 181.214.31.79 | 61440 (Digital E...) (Digital Energy Technologies Chile SpA) | |
6 | 192.232.198.171 192.232.198.171 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
7 | 2 |
ASN61440 (Digital Energy Technologies Chile SpA, CL)
PTR: miami.servershost.net
mustangtrekkinginnepal.com |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: gog.gogolerww.com
gotayflor.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
gotayflor.com
gotayflor.com |
31 KB |
1 |
mustangtrekkinginnepal.com
mustangtrekkinginnepal.com |
968 B |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | gotayflor.com |
mustangtrekkinginnepal.com
gotayflor.com |
1 | mustangtrekkinginnepal.com | |
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
gotayflor.com cPanel, Inc. Certification Authority |
2018-05-17 - 2018-08-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://gotayflor.com/images/online/www.wellsfargo.com/
Frame ID: B826A87DDD293786A4A13CBCD2E4E891
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://mustangtrekkinginnepal.com/css/font/file/index.htm Page URL
- https://gotayflor.com/images/online/www.wellsfargo.com/ Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://mustangtrekkinginnepal.com/css/font/file/index.htm Page URL
- https://gotayflor.com/images/online/www.wellsfargo.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.htm
mustangtrekkinginnepal.com/css/font/file/ |
1 KB 968 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
gotayflor.com/images/online/www.wellsfargo.com/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header.png
gotayflor.com/images/online/www.wellsfargo.com/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
need.png
gotayflor.com/images/online/www.wellsfargo.com/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
right.png
gotayflor.com/images/online/www.wellsfargo.com/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ff.png
gotayflor.com/images/online/www.wellsfargo.com/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
gotayflor.com/images/online/www.wellsfargo.com/img/ |
152 B 394 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
gotayflor.com
mustangtrekkinginnepal.com
181.214.31.79
192.232.198.171
0fd8d089480ae01472b2a6134b029606e0d96be0436af4fdc17507d63db50930
1bf4eba743420a7a7b9eb54f9e07d60fc409ff2b66a8fe071901a9a0eae110ec
2b0b1368a9ac77f00366796ef06eff4fd3ced103ec21d32b3ece02f23aa63ff4
82b099b4e29a02983c8c94fcf61ca0e684b01e98edb852aa5af48eab2676b445
90f208fbc9e14a3d66c70286bfcd6340b5def873076fd3c50b8d09c171977a42
9d50e3ffb2f3a2411abfe7cacaea93174c305a0387b38e8c58a612338ade17bc
dd77bede93256e88a4f6b6b05bca756126011650ce56a2a5e7ea6ecf44941fe2