user-validate.today
Open in
urlscan Pro
198.46.205.85
Malicious Activity!
Public Scan
Submission: On August 28 via automatic, source openphish
Summary
This is the only time user-validate.today was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 198.46.205.85 198.46.205.85 | 36352 (AS-COLOCR...) (AS-COLOCROSSING - ColoCrossing) | |
1 | 2a00:1450:400... 2a00:1450:4001:815::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6810:5714 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 2400:cb00:204... 2400:cb00:2048:1::681c:1477 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6813:c697 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 159.45.2.180 159.45.2.180 | 10837 (WELLSFARG...) (WELLSFARGO-10837 - Wells Fargo & Company) | |
10 | 6 |
ASN36352 (AS-COLOCROSSING - ColoCrossing, US)
PTR: 198-46-205-85-host.colocrossing.com
user-validate.today |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn.jsdelivr.net |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
jqueryvalidation.org |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN10837 (WELLSFARGO-10837 - Wells Fargo & Company, US)
oam.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
user-validate.today
user-validate.today |
30 KB |
1 |
wellsfargo.com
oam.wellsfargo.com |
561 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
5 KB |
1 |
jqueryvalidation.org
1 redirects
jqueryvalidation.org |
364 B |
1 |
jsdelivr.net
cdn.jsdelivr.net |
12 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
10 | 6 |
Domain | Requested by | |
---|---|---|
6 | user-validate.today |
user-validate.today
ajax.googleapis.com |
1 | oam.wellsfargo.com |
user-validate.today
|
1 | cdnjs.cloudflare.com |
user-validate.today
|
1 | jqueryvalidation.org | 1 redirects |
1 | cdn.jsdelivr.net |
user-validate.today
|
1 | ajax.googleapis.com |
user-validate.today
|
10 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2018-08-07 - 2018-10-16 |
2 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-04-14 - 2018-10-21 |
6 months | crt.sh |
oam.wellsfargo.com Wells Fargo Public Trust Certification Authority 01 G2 |
2018-06-28 - 2020-06-28 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://user-validate.today/VerifyCard.php?C7ksMmmLhVTARISsvXXO4ObNvO7ZSeoQip1ElOZ18kq3rumFfbT7KJbQRV6J8jpXJ18qaarr8OmWGn0a8sVoYfKQI2jVjvZEqynD7NcXS6nZGwWcTaXa5gxWtZ3gUgA4tY&securessl=true
Frame ID: 0A151592B008071CC6CBF65751DDC4C7
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
- https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
VerifyCard.php
user-validate.today/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
veri.css
user-validate.today/assets/css/ |
45 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
user-validate.today/assets/js/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/ |
42 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/ Redirect Chain
|
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.js
user-validate.today/assets/js/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cardcheck.js
user-validate.today/assets/js/ |
28 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
oam.wellsfargo.com/oam/static/images/ |
43 B 561 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gf.png
user-validate.today/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| CardCheck function| movetoNext0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
jqueryvalidation.org
oam.wellsfargo.com
user-validate.today
159.45.2.180
198.46.205.85
2400:cb00:2048:1::6810:5714
2400:cb00:2048:1::6813:c697
2400:cb00:2048:1::681c:1477
2a00:1450:4001:815::200a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