danyal-pipelines.com
Open in
urlscan Pro
210.56.60.146
Malicious Activity!
Public Scan
Submission: On October 05 via api from CA — Scanned from CA
Summary
This is the only time danyal-pipelines.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 210.56.60.146 210.56.60.146 | 38197 (SUNHK-DAT...) (SUNHK-DATA-AS-AP Sun Network Hong Kong Limited - HongKong Backbone) | |
6 | 159.45.170.156 159.45.170.156 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
2 | 23.217.22.149 23.217.22.149 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 4 |
ASN38197 (SUNHK-DATA-AS-AP Sun Network Hong Kong Limited - HongKong Backbone, HK)
PTR: hk4.cycom.asia
danyal-pipelines.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-217-22-149.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
wellsfargo.com
connect.secure.wellsfargo.com — Cisco Umbrella Rank: 13820 |
240 KB |
2 |
wellsfargomedia.com
www15.wellsfargomedia.com — Cisco Umbrella Rank: 35055 |
44 KB |
1 |
danyal-pipelines.com
danyal-pipelines.com |
12 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
6 | connect.secure.wellsfargo.com |
danyal-pipelines.com
|
2 | www15.wellsfargomedia.com |
connect.secure.wellsfargo.com
|
1 | danyal-pipelines.com | |
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2022-06-22 - 2023-06-22 |
a year | crt.sh |
www15.wellsfargomedia.com DigiCert SHA2 Secure Server CA |
2021-12-31 - 2023-01-03 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://danyal-pipelines.com/rupi/wp-includes/js/dist/vendor/w3llscaptcha/dashboard/login.php
Frame ID: F608B0B1B66E224611383919A98E3BA6
Requests: 15 HTTP requests in this frame
11 Outgoing links
These are links going to different origins than the main page.
Title: Apply
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Enrollment FAQs
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: Privacy, Security and Legal
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Home
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
danyal-pipelines.com/rupi/wp-includes/js/dist/vendor/w3llscaptcha/dashboard/ |
36 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
connect.secure.wellsfargo.com/auth/static/css/altLogin/ |
20 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-header.css
connect.secure.wellsfargo.com/auth/static/css/altLogin/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
content.css
connect.secure.wellsfargo.com/auth/static/css/altLogin/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-fonts.css
connect.secure.wellsfargo.com/auth/static/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-footer.css
connect.secure.wellsfargo.com/auth/static/css/altLogin/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WF_stagecoach_rgb_ylw_F1.svg
connect.secure.wellsfargo.com/auth/static/images/ |
226 KB 227 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
889 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| check0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
danyal-pipelines.com
www15.wellsfargomedia.com
159.45.170.156
210.56.60.146
23.217.22.149
29a62821c3d407913d603602dfe9d23eacded368f22d39c4ff58124a08ef1d56
3a80ebe861b93c47265b21bc70a9fa88fc95e76f39cb291ad05b24597446ef8e
5145f5faf6c1269bdd974357ed344b9cd5f4e4cea424c14dd302a9c11a206741
631f3b6267a831a8d67c45e480b5d5a2601f10ff8708bcf3a45a41b377a129cc
7771de27489be5e0c7b06e07de4f30f7d4cfb7bb7e88dc93d792e19f89693ca3
876deeddf953ae3dedf91bc8aa9be1385ebb4e1e80f8a20da5a33865eaf9f3e3
8dbca82c7c6b96415fee4d0e7fdddaed8042de685bf3c5d087c3f67f41866668
9843ab395fb4cf414353b03927156a9d38c3cc3157469afd9ee97f2058445e39
ab9d8c97b35ed86b6224aca911aa304a0d7dbcbd28e00a4c6585b96e28ed30ba
b319b049366dde73690990738ac5af4fb9937d18abac85b01aaff185b5262868
d8401dffb0fbd458ce8332222f9a1d3431bcba86f9401debf60e7783242d4150
df500743bbedcef7623fdf2ef0c05ca411437c6216674271f4cc8b32f910f96d
ed6ee05587907928e253a6176cf2e50ae1653f3f255bb1f95e8fe7a0946d2bcb
f7899cfdbc342decc4aeb0bae9ada39bfaa8ae3c687fc72119fca2efdf77dff2
f8cb039a63b11f207edf324bbfdabbbfaa2d421729785dca77020490c293185e