elportenio.com
Open in
urlscan Pro
2606:4700:3036::6815:3aa9
Malicious Activity!
Public Scan
Submission: On October 31 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on July 18th 2021. Valid for: a year.
This is the only time elportenio.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:303... 2606:4700:3036::6815:3aa9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
elportenio.com
elportenio.com |
316 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
7 | elportenio.com |
elportenio.com
|
7 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
oam.wellsfargo.com |
icomplete.wellsfargo.com |
www.wellsfargorewards.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-07-18 - 2022-07-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://elportenio.com/css/WellsFargoFinal/signin.php?cmd=login_submit&id=673633b5fd74a757af97862fbd5240ad673633b5fd74a757af97862fbd5240ad&session=673633b5fd74a757af97862fbd5240ad673633b5fd74a757af97862fbd5240ad
Frame ID: CC773110AEE862F36F9D8F39E0166C84
Requests: 15 HTTP requests in this frame
16 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Forgot Password/Username?
Search URL Search Domain Scan URL
Title: Enroll Now
Search URL Search Domain Scan URL
Title: Enrollment FAQs
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: Privacy, Security and Legal
Search URL Search Domain Scan URL
Title: Online Access Agreement
Search URL Search Domain Scan URL
Title: Applications In Progress
Search URL Search Domain Scan URL
Title: Credit Card Rewards
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
signin.php
elportenio.com/css/WellsFargoFinal/ |
406 KB 285 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
global.css
elportenio.com/css/WellsFargoFinal/static/css/altLogin/ |
20 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
enhanced-header.css
elportenio.com/css/WellsFargoFinal/static/css/altLogin/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wf.css
elportenio.com/css/WellsFargoFinal/static/Fonts/wf/ |
199 B 441 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
enhanced-footer.css
elportenio.com/css/WellsFargoFinal/static/css/altLogin/ |
2 KB 971 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
utag.js
elportenio.com/static.wellsfargo.com/tracking/main/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WellsFargoSans_W_Rg.woff2
elportenio.com/css/WellsFargoFinal/static/Fonts/wf/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
889 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
839 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| antiClickjack string| webId string| ndURI object| utag_data function| updateCustomSelect function| enrollPrivacySecLinkHandler0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
elportenio.com
2606:4700:3036::6815:3aa9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