www.tycoonresort.com
Open in
urlscan Pro
162.215.253.215
Malicious Activity!
Public Scan
Submission: On October 26 via api from US — Scanned from DE
Summary
This is the only time www.tycoonresort.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 162.215.253.215 162.215.253.215 | 394695 (PUBLIC-DO...) (PUBLIC-DOMAIN-REGISTRY) | |
2 | 104.16.18.94 104.16.18.94 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 159.45.2.177 159.45.2.177 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
1 | 142.250.184.202 142.250.184.202 | 15169 (GOOGLE) (GOOGLE) | |
14 | 5 |
ASN394695 (PUBLIC-DOMAIN-REGISTRY, US)
PTR: cp-49.webhostbox.net
www.tycoonresort.com |
ASN15169 (GOOGLE, US)
PTR: fra24s11-in-f10.1e100.net
ajax.googleapis.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
tycoonresort.com
www.tycoonresort.com |
160 KB |
2 |
wellsfargo.com
apply.wellsfargo.com |
7 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com |
13 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
14 | 4 |
Domain | Requested by | |
---|---|---|
9 | www.tycoonresort.com |
www.tycoonresort.com
|
2 | apply.wellsfargo.com |
www.tycoonresort.com
|
2 | cdnjs.cloudflare.com |
www.tycoonresort.com
|
1 | ajax.googleapis.com |
www.tycoonresort.com
|
14 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-21 - 2022-09-20 |
a year | crt.sh |
apply.wellsfargo.com Wells Fargo Public Trust Certification Authority 01 G2 |
2020-05-22 - 2022-05-26 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.tycoonresort.com/wells/index2.php
Frame ID: 9A18E5377C5A0B9FD9072E1A251A2421
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Wells Fargo - Verification - Credit cardDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
- /([\d.]+)/jquery(?:\.min)?\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 10- http://cdnjs.cloudflare.com/ajax/libs/jquery-form-validator/2.3.26/jquery.form-validator.min.js HTTP 307
- https://cdnjs.cloudflare.com/ajax/libs/jquery-form-validator/2.3.26/jquery.form-validator.min.js
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index2.php
www.tycoonresort.com/wells/ |
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mobile.css
www.tycoonresort.com/wells/Spox/Files/css/ |
203 KB 61 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
normalize.css
www.tycoonresort.com/wells/Spox/Files/css/ |
10 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Wells-Fargo-LIVE-Div.css
www.tycoonresort.com/wells/Spox/Files/css/ |
17 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ClientPage.css
www.tycoonresort.com/wells/Spox/Files/css/ |
11 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
desktop-tablet.combined.css
www.tycoonresort.com/wells/Spox/Files/css/ |
152 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
security.js
cdnjs.cloudflare.com/ajax/libs/jquery-form-validator/2.3.26/ |
10 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lol1.svg
www.tycoonresort.com/wells/Spox/Files/img/ |
6 KB 6 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
visa.svg
apply.wellsfargo.com/assets/images/osmp/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mastercard.svg
apply.wellsfargo.com/assets/images/osmp/ |
4 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.10.2/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.form-validator.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-form-validator/2.3.26/ Redirect Chain
|
29 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
428 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b87d1abf881446b2bae0d8204029d20a9b85e656-l.woff2
www.tycoonresort.com/wells/Spox/Files/css/ |
3 KB 3 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b87d1abf881446b2bae0d8204029d20a9b85e656-d.woff
www.tycoonresort.com/wells/Spox/Files/css/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery object| jQuery110206582910434695639 function| reCaptchaLoaded1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
apply.wellsfargo.com/ | Name: ISD_OSM_COOKIE Value: dNxDGyEQb+tcy7vOM8djC+/N/LsGCGdKk1S0exm/HciByufNINZ02DIdP8RGhBDg9uU27rseTbEzTSYAAAAB |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
apply.wellsfargo.com
cdnjs.cloudflare.com
www.tycoonresort.com
104.16.18.94
142.250.184.202
159.45.2.177
162.215.253.215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