www.kellaroot.com
Open in
urlscan Pro
67.20.55.117
Malicious Activity!
Public Scan
Submission: On April 29 via automatic, source openphish
Summary
This is the only time www.kellaroot.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 67.20.55.117 67.20.55.117 | 40819 (VPSDATACE...) (VPSDATACENTER) | |
2 | 2.17.180.241 2.17.180.241 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
14 | 3 |
ASN40819 (VPSDATACENTER, US)
PTR: fastfoodmenuprice.com
www.kellaroot.com |
ASN16625 (AKAMAI-AS, US)
PTR: a2-17-180-241.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
kellaroot.com
www.kellaroot.com |
256 KB |
2 |
wellsfargomedia.com
www15.wellsfargomedia.com |
45 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
12 | www.kellaroot.com |
www.kellaroot.com
|
2 | www15.wellsfargomedia.com |
www.kellaroot.com
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
connect.secure.wellsfargo.com |
www.wellsfargo.com |
oam.wellsfargo.com |
icomplete.wellsfargo.com |
www.wellsfargorewards.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www15.wellsfargomedia.com DigiCert SHA2 Secure Server CA |
2019-12-31 - 2021-03-31 |
a year | crt.sh |
This page contains 4 frames:
Primary Page:
http://www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/signin.php
Frame ID: AEF1CA836F27A5B62C903345E49B0472
Requests: 15 HTTP requests in this frame
Frame:
http://www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/saved_resource.html
Frame ID: BEAB124B8E7FBE5CB0E619E363DB27A9
Requests: 1 HTTP requests in this frame
Frame:
http://www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/saved_resource(1).html
Frame ID: 13A1A43EB7A1998AFB16CB876A5F71D3
Requests: 2 HTTP requests in this frame
Frame:
http://www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/saved_resource(2).html
Frame ID: B7CFCFFCEEA69E6025E2A527C2758A62
Requests: 2 HTTP requests in this frame
19 Outgoing links
These are links going to different origins than the main page.
Title: main content default
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Back to Previous Page
Search URL Search Domain Scan URL
Title: EspaƱol
Search URL Search Domain Scan URL
Title: Forgot Password/Username?
Search URL Search Domain Scan URL
Title: Enroll Now
Search URL Search Domain Scan URL
Title: Enrollment FAQs
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: Privacy, Security and Legal
Search URL Search Domain Scan URL
Title: Online Access Agreement
Search URL Search Domain Scan URL
Title: Applications In Progress
Search URL Search Domain Scan URL
Title: Credit Card Rewards
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signin.php
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/ |
40 KB 14 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ |
20 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-header.css
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
content.css
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ |
1 KB 939 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-fonts.css
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ |
4 KB 707 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-footer.css
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WF_stagecoach_rgb_ylw_F1.svg
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ |
226 KB 227 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource.html
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ Frame BEAB |
187 B 494 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource(1).html
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ Frame 13A1 |
393 B 700 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource(2).html
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ Frame B7CF |
394 B 701 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
889 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ Frame 13A1 |
1 KB 1 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon(1).ico
www.kellaroot.com/wp-includes/pomo/WellsFargoFinal/login_files/ Frame B7CF |
1 KB 1 KB |
Image
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| animateLabel function| removeAnimation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.kellaroot.com
www15.wellsfargomedia.com
2.17.180.241
67.20.55.117
3a80ebe861b93c47265b21bc70a9fa88fc95e76f39cb291ad05b24597446ef8e
5145f5faf6c1269bdd974357ed344b9cd5f4e4cea424c14dd302a9c11a206741
631f3b6267a831a8d67c45e480b5d5a2601f10ff8708bcf3a45a41b377a129cc
7771de27489be5e0c7b06e07de4f30f7d4cfb7bb7e88dc93d792e19f89693ca3
8670da3c95c03b59b091eac882b67e0b59b765c455b8d871abd2e55d4618573b
9843ab395fb4cf414353b03927156a9d38c3cc3157469afd9ee97f2058445e39
a57f8fd576bebad051af13accd8172a54cf6c576db4051d5cb2080dd38ec536b
aadf9ecc3d3b8fb16bf23d84000e216b9603e81c10c4e588206182579d53deda
ab78c44d5e86c6f0937d203066ebcadbf50c8d63407564a151bdd03701f40a70
ab9d8c97b35ed86b6224aca911aa304a0d7dbcbd28e00a4c6585b96e28ed30ba
ac85a725273f773a00e3554c13f38056c59954a4e0ed37f7abfeecd56ba52ee9
b319b049366dde73690990738ac5af4fb9937d18abac85b01aaff185b5262868
d8401dffb0fbd458ce8332222f9a1d3431bcba86f9401debf60e7783242d4150
d98f43e719b9421abb6bc8ca54d4c4bbcea8404fabe83b73632a810cd1c95057
dd23185a1a026fbd41ab27bf91feb741ed0494a0b56e18a9773d988ec34c6436
df500743bbedcef7623fdf2ef0c05ca411437c6216674271f4cc8b32f910f96d
ed6ee05587907928e253a6176cf2e50ae1653f3f255bb1f95e8fe7a0946d2bcb
f7899cfdbc342decc4aeb0bae9ada39bfaa8ae3c687fc72119fca2efdf77dff2
f8cb039a63b11f207edf324bbfdabbbfaa2d421729785dca77020490c293185e