kgfoundation.qa
Open in
urlscan Pro
107.181.170.131
Malicious Activity!
Public Scan
Effective URL: http://kgfoundation.qa/cds/identification/login.php
Submission: On September 13 via automatic, source openphish — Scanned from DE
Summary
This is the only time kgfoundation.qa was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 7 | 107.181.170.131 107.181.170.131 | 46562 (PERFORMIVE) (PERFORMIVE) | |
4 | 23.205.226.231 23.205.226.231 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 2 |
ASN46562 (PERFORMIVE, US)
PTR: mta5.innovatspace.top
kgfoundation.qa |
ASN16625 (AKAMAI-AS, US)
PTR: a23-205-226-231.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
kgfoundation.qa
2 redirects
kgfoundation.qa |
763 KB |
4 |
wellsfargomedia.com
www15.wellsfargomedia.com — Cisco Umbrella Rank: 41550 |
93 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
7 | kgfoundation.qa |
2 redirects
kgfoundation.qa
|
4 | www15.wellsfargomedia.com |
kgfoundation.qa
|
9 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
oam.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www15.wellsfargomedia.com DigiCert SHA2 Secure Server CA |
2021-12-31 - 2023-01-03 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
http://kgfoundation.qa/cds/identification/login.php
Frame ID: 818E12CFE1158C5FAC046D61A339DDE3
Requests: 8 HTTP requests in this frame
Frame:
http://kgfoundation.qa/cds/identification/assets/src=2549153.html
Frame ID: B51231F36CD10ADDDB86B14CAC7AED23
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Sign On to View Your Personal Accounts | Wells FargoPage URL History Show full URLs
-
http://kgfoundation.qa/cds/identification
HTTP 301
http://kgfoundation.qa/cds/identification/ HTTP 302
http://kgfoundation.qa/cds/identification/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Forgot username or password?
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://kgfoundation.qa/cds/identification
HTTP 301
http://kgfoundation.qa/cds/identification/ HTTP 302
http://kgfoundation.qa/cds/identification/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
kgfoundation.qa/cds/identification/ Redirect Chain
|
52 KB 52 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfui.5d3fa5b6daab852c2a31.chunk.css
kgfoundation.qa/cds/identification/assets/ |
99 KB 99 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.b3b5f355e18c2c42a801.chunk.css
kgfoundation.qa/cds/identification/assets/ |
12 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
COB-BOB-IRT-enroll_tractor.jpg
kgfoundation.qa/cds/identification/assets/ |
599 KB 599 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
src=2549153.html
kgfoundation.qa/cds/identification/assets/ Frame B512 |
149 B 390 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-bd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargoserif-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
26 KB 26 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kgfoundation.qa
www15.wellsfargomedia.com
107.181.170.131
23.205.226.231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