iconickidz.in
Open in
urlscan Pro
162.241.85.94
Malicious Activity!
Public Scan
Effective URL: https://iconickidz.in/wellsfargo/login.php?cmd=login_submit&id=35796cf9af0a69c67dc86ab6ad2e30d735796cf9af0a69c67dc86ab...
Submission: On July 27 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 11th 2020. Valid for: 3 months.
This is the only time iconickidz.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 23.94.191.90 23.94.191.90 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
2 13 | 162.241.85.94 162.241.85.94 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 69.89.31.230 69.89.31.230 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
13 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
iconickidz.in
2 redirects
iconickidz.in |
2 MB |
2 |
thebrainbrand.com
2 redirects
thebrainbrand.com |
559 B |
1 |
smallenvelop.com
smallenvelop.com |
|
1 |
googleapis.com
ajax.googleapis.com |
29 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
13 | iconickidz.in |
2 redirects
iconickidz.in
|
2 | thebrainbrand.com | 2 redirects |
1 | smallenvelop.com |
iconickidz.in
|
1 | ajax.googleapis.com |
iconickidz.in
|
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpcalendars.iconickidz.in Let's Encrypt Authority X3 |
2020-06-11 - 2020-09-09 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-07-07 - 2020-09-29 |
3 months | crt.sh |
smallenvelop.com Let's Encrypt Authority X3 |
2020-06-24 - 2020-09-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://iconickidz.in/wellsfargo/login.php?cmd=login_submit&id=35796cf9af0a69c67dc86ab6ad2e30d735796cf9af0a69c67dc86ab6ad2e30d7&session=35796cf9af0a69c67dc86ab6ad2e30d735796cf9af0a69c67dc86ab6ad2e30d7
Frame ID: A6015685CA3AA53E5D3852EB9AC6AB97
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://thebrainbrand.com/wellsfargo
HTTP 301
https://thebrainbrand.com/wellsfargo/ HTTP 302
https://iconickidz.in/wellsfargo HTTP 301
https://iconickidz.in/wellsfargo/ HTTP 302
https://iconickidz.in/wellsfargo/login.php?cmd=login_submit&id=35796cf9af0a69c67dc86ab6ad2e30d7357... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://thebrainbrand.com/wellsfargo
HTTP 301
https://thebrainbrand.com/wellsfargo/ HTTP 302
https://iconickidz.in/wellsfargo HTTP 301
https://iconickidz.in/wellsfargo/ HTTP 302
https://iconickidz.in/wellsfargo/login.php?cmd=login_submit&id=35796cf9af0a69c67dc86ab6ad2e30d735796cf9af0a69c67dc86ab6ad2e30d7&session=35796cf9af0a69c67dc86ab6ad2e30d735796cf9af0a69c67dc86ab6ad2e30d7 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
iconickidz.in/wellsfargo/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h1.png
iconickidz.in/wellsfargo/images/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h2.png
iconickidz.in/wellsfargo/images/ |
574 KB 579 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h3.png
iconickidz.in/wellsfargo/images/ |
371 KB 373 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h4.png
iconickidz.in/wellsfargo/images/ |
652 KB 652 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h5.png
iconickidz.in/wellsfargo/images/ |
305 KB 305 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h6.png
iconickidz.in/wellsfargo/images/ |
78 KB 78 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wgh.png
iconickidz.in/wellsfargo/images/ |
805 B 858 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h7.png
iconickidz.in/wellsfargo/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
h8.png
iconickidz.in/wellsfargo/images/ |
163 KB 164 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Preloader_11.gif
smallenvelop.com/wp-content/uploads/2014/08/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wsm.png
iconickidz.in/wellsfargo/images/ |
445 B 498 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
iconickidz.in
smallenvelop.com
thebrainbrand.com
162.241.85.94
23.94.191.90
2a00:1450:4001:802::200a
69.89.31.230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