dadsfarm.co.id
Open in
urlscan Pro
202.182.182.190
Malicious Activity!
Public Scan
Effective URL: http://dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/signin.php?error=&appIdKey=WJ4ZGLzmrxj3cbFusfSBghM...
Submission: On April 23 via manual from GH
Summary
This is the only time dadsfarm.co.id was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
21 | 202.182.182.190 202.182.182.190 | 9875 (PESAT1-AS...) (PESAT1-AS-AP PT. Pasifik Satelit Nusantara) | |
4 | 159.45.66.178 159.45.66.178 | 4196 (WELLSFARG...) (WELLSFARGO-4196) | |
2 | 2.17.180.241 2.17.180.241 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 2606:4700:303... 2606:4700:3033::681c:1162 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
28 | 5 |
ASN9875 (PESAT1-AS-AP PT. Pasifik Satelit Nusantara, ID)
PTR: petita.pesat.net.id
dadsfarm.co.id |
ASN16625 (AKAMAI-AS, US)
PTR: a2-17-180-241.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
dadsfarm.co.id
dadsfarm.co.id |
954 KB |
4 |
wellsfargo.com
static.wellsfargo.com |
67 KB |
2 |
wellsfargomedia.com
www15.wellsfargomedia.com |
45 KB |
1 |
jsonblob.com
jsonblob.com |
337 B |
28 | 4 |
Domain | Requested by | |
---|---|---|
21 | dadsfarm.co.id |
dadsfarm.co.id
|
4 | static.wellsfargo.com |
dadsfarm.co.id
|
2 | www15.wellsfargomedia.com |
dadsfarm.co.id
|
1 | jsonblob.com |
dadsfarm.co.id
|
28 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
connect.secure.wellsfargo.com |
oam.wellsfargo.com |
icomplete.wellsfargo.com |
www.wellsfargorewards.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
static.wellsfargo.com DigiCert Global CA G2 |
2019-02-07 - 2021-02-07 |
2 years | crt.sh |
www15.wellsfargomedia.com DigiCert SHA2 Secure Server CA |
2019-12-31 - 2021-03-31 |
a year | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-12-19 - 2020-10-09 |
10 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/signin.php?error=&appIdKey=WJ4ZGLzmrxj3cbFusfSBghMdKQ&country=US
Frame ID: C1F2A16B6E2A729C2A2C9995CD4A8CDE
Requests: 36 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/unlock_account.php Page URL
- http://dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/signin.php?error=&appIdKey=WJ4... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
CentOS (Operating Systems) Expand
Detected patterns
- headers server /CentOS/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
16 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: EspaƱol
Search URL Search Domain Scan URL
Title: Forgot Password/Username?
Search URL Search Domain Scan URL
Title: Enroll Now
Search URL Search Domain Scan URL
Title: Enrollment FAQs
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: Privacy, Security and Legal
Search URL Search Domain Scan URL
Title: Online Access Agreement
Search URL Search Domain Scan URL
Title: Applications In Progress
Search URL Search Domain Scan URL
Title: Credit Card Rewards
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/unlock_account.php Page URL
- http://dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/signin.php?error=&appIdKey=WJ4ZGLzmrxj3cbFusfSBghMdKQ&country=US Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
unlock_account.php
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/ |
119 B 487 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
signin.php
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/ |
53 KB 53 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gateway.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
19 KB 19 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
43 KB 44 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_004.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
246 KB 247 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-header.css
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
content.css
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-fonts.css
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-footer.css
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glu.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
srcen.min.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
55 KB 56 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
57 KB 57 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_003.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
3 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_002.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
5 KB 5 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WF_stagecoach_rgb_ylw_F1.svg
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
226 KB 227 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
187 KB 187 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
23 KB 23 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
dadsfarm.co.id/uploaded/shm_tc_user/WellsFargo/login/session/wells_files/ |
1023 B 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.js
static.wellsfargo.com/tracking/main/ |
255 KB 34 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
330 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
889 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
839 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.9.0.js
dadsfarm.co.id/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
dadsfarm.co.id/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fs.utils.js
static.wellsfargo.com/tracking/survey/code/ |
43 KB 14 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gateway.min.js
static.wellsfargo.com/tracking/survey/ |
19 KB 8 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fs.compress.js
static.wellsfargo.com/tracking/survey/code/ |
31 KB 12 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c039c0a3-2989-11ea-a02c-a12968f28a9c
jsonblob.com/api/jsonBlob/ |
78 B 337 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)151 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| FSR object| FSFB function| _acsDefine function| _fsDefine function| _acsRequire function| _fsRequire function| _acsNormalizeUrl function| _fsNormalizeUrl function| _fsNormalizeAssetUrl boolean| _fsAlreadyBootedSDK function| ndoGetObjectKeys function| nsxxbkmfmj boolean| nsxxbk string| ndjsStaticVersion function| nszstur object| nsszdff function| nslzy function| nsgynr object| nslzywkid boolean| nszsturam number| nsxxbkmfm function| nskguqm number| nslzyw object| nskmgrrzq object| nslzywki object| nskguq function| HashUtil object| nskguqmtar object| nsszdffljz object| nsdekohx boolean| nsxxbkm string| nslzywk object| nds object| nskgu number| numQueries object| returned string| version undefined| nsdekoh string| nsszd string| nsszdfflj function| nsdek string| nsdekohxz string| nsgynrt string| nszstura string| nsdekohxzp object| nsszdffl function| nsxxbkmf object| nszst function| nsxxb function| nskmgrrzqc function| nszstu function| nsgynrtmis function| nskguqmta function| nsgynrtmi function| nsgyn function| nsdeko function| nskmgr function| nskguqmt function| nslzywkidt function| nskmgrr function| nsszdf function| nskmgrrz function| ndwts function| nsgynrtm function| nszsturamw function| nsrsoqgiw function| nsakxshrd function| nsvfo function| nsrsoq function| nsakx function| nsearl function| nsakxsh function| nsrhnkig function| nsearldqim function| nsrjmxge function| nsvfosrqw function| nsvfosrqwk function| nsrsoqg function| nsearldqi function| nsmht function| nsvfos object| nskmg function| nsrhnkigac function| ndwti object| ndsapi string| webId string| ndURI object| utag_data string| USERPREFS_PATH string| UPRESOURCE_PATH string| ATADUN_PATH string| loginUrlBase object| scriptParent string| loginUrlBaseNoProtocol object| getUrl string| host string| port undefined| guid function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged function| addScriptElement function| getCookie function| appendHiddenInput function| addCookiesToForm function| generateGuid undefined| brief object| lun3 boolean| isNative object| LoginForm object| Search function| updateCustomSelect function| enrollPrivacySecLinkHandler function| acsReady boolean| utag_condload string| new_path object| utag_cfg_ovrd object| userAgentArr undefined| pathname undefined| urlArray undefined| url undefined| sRegExInput object| utag function| utag_pad function| utag_visitor_id string| GoogleAnalyticsObject function| ga object| _0x29bc function| _0x1c61 object| Email function| $ function| jQuery object| fswf function| fsReady object| __fsReady_stk__ undefined| regex string| gtagRename object| dataLayer function| gtag string| uName string| uPass0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dadsfarm.co.id
jsonblob.com
static.wellsfargo.com
www15.wellsfargomedia.com
159.45.66.178
2.17.180.241
202.182.182.190
2606:4700:3033::681c:1162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