www.adhikshakgovt.org
Open in
urlscan Pro
13.235.88.17
Malicious Activity!
Public Scan
Effective URL: https://www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/
Submission: On August 30 via manual from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on July 3rd 2019. Valid for: 3 months.
This is the only time www.adhikshakgovt.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:30:... 2606:4700:30::681b:a167 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 13.235.88.17 13.235.88.17 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
16 | 2 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
www.renttherunwayfoundation.org |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: mail.crewbyte.com
www.adhikshakgovt.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
adhikshakgovt.org
www.adhikshakgovt.org |
166 KB |
1 |
renttherunwayfoundation.org
www.renttherunwayfoundation.org |
443 B |
16 | 2 |
Domain | Requested by | |
---|---|---|
15 | www.adhikshakgovt.org |
www.adhikshakgovt.org
|
1 | www.renttherunwayfoundation.org | |
16 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni110863.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-08-20 - 2020-02-26 |
6 months | crt.sh |
adhikshakgovt.org Let's Encrypt Authority X3 |
2019-07-03 - 2019-10-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/
Frame ID: E09706436E70D7798BBE201CB0BED130
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://www.renttherunwayfoundation.org/wp-includes/certificates/com.htm Page URL
- https://www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.renttherunwayfoundation.org/wp-includes/certificates/com.htm Page URL
- https://www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
com.htm
www.renttherunwayfoundation.org/wp-includes/certificates/ |
177 B 443 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/css/ |
115 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-theme.min.css
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/css/ |
19 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/css/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/js/ |
197 B 514 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax.js
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/js/ |
269 B 587 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
autoScrollTo.js
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/js/ |
846 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fadeEffects.js
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/js/ |
959 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brandlogo.jpg
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/images/ |
10 KB 10 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
srch.png
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/images/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
top.png
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/images/ |
38 KB 39 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fgtpsw.png
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/images/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sideimage.png
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/images/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/js/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
www.adhikshakgovt.org/inauguration/images/fonts/wells-fargo-secure/wells-fargo-08-030/newfa/js/ |
35 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _ function| toggleElement function| ajaxObj function| ajaxReturn number| distance number| speed function| autoScrollTo function| resetScroller number| fade_in_from number| fade_out_from function| fadeIn function| fadeOut function| $ function| jQuery object| jQuery1113037822869442535370 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.adhikshakgovt.org
www.renttherunwayfoundation.org
13.235.88.17
2606:4700:30::681b:a167
0d732aa5e1f7c2be96fb0106ffe529edfdaa181f3974a0304b9a7ccffb49da26
219deb8650d3f4b4ab5cd6780ef243c2818045370a3fb02b0a3f3d61433ced6a
2453e31f9c5e0dbee528d11f97a85edf897ed93406954ce8e475f0244abf249a
28c4c243f6abd2c2b6704b95f55f46fd1da9cace1fc44d02f36e71bf8c244487
36462c211b3c6a632fab5671cc9c0474eae0bad36046bf6a557db6777ec63896
4d291da25d7abca6ad3b196837781c7fd7af1cbabccacf769ba62fddd21a4437
4e7e1c16e351e7bfc80cddef9f98e99113ddb0d1e201be00d53955fe62f0e523
ae06f37bf3052bd57d4ad1678961c71a3cde79ba6a044f07955758dcebd04154
c16a1d3583bbc9a9ef5775de248a65e74cfee7dde15fb3e46e9c5cbdfb8ef83e
d5fd173d00d9733900834e0e1083de86b532e048b15c0420ba5c2db0623644b8
e1788ffea984a206f68a35700a2a38616890d680b14665d9fdcc2868f18c076e
e8015a60743507db32f3c1779296a9ccda8fc8e4593ba88484f429af179f67eb
f04b517ba5d6a0510485689a3e42dac000f51640fd71b986804cba178eae42a5
f7b3fb79dd8cedbdd48fc2ebb65653461a9732016a1b7a73cd3df615fd0470e0
f7da0d7791a9707bdd049dc6b4a3aff0db80680297e61d1f8da9445f4129446a
fe1a46de88409d6683a1d724c10d2b86d7a90954ca4e84221590122e4fd5bd50