kursdollara.f-noks.info
Open in
urlscan Pro
217.107.219.192
Malicious Activity!
Public Scan
Submission: On December 20 via automatic, source openphish
Summary
This is the only time kursdollara.f-noks.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 217.107.219.192 217.107.219.192 | 8342 (RTCOMM-AS) (RTCOMM-AS) | |
17 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
f-noks.info
kursdollara.f-noks.info |
|
17 | 1 |
Domain | Requested by | |
---|---|---|
17 | kursdollara.f-noks.info |
kursdollara.f-noks.info
|
17 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.facebook.com |
plus.google.com |
www.linkedin.com |
instagram.com |
www.pinterest.com |
www.youtube.com |
twitter.com |
blogs.wellsfargo.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://kursdollara.f-noks.info/verification.php
Frame ID: (E7DBDAAC0DDAE8D632C796A8A56D2DD9)
Requests: 17 HTTP requests in this frame
8 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
verification.php
kursdollara.f-noks.info/ |
25 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
homepage.css
kursdollara.f-noks.info/css/home/ |
67 KB 0 |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-logo.gif
kursdollara.f-noks.info/images/global/ |
4 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
stagecoach.jpg
kursdollara.f-noks.info/images/global/ |
5 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-equal-housing.gif
kursdollara.f-noks.info/images/global/ |
776 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon-lock-sm.png
kursdollara.f-noks.info/images/css/template/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search_bar_gray_button_45x30.png
kursdollara.f-noks.info/images/css/template/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn-icon-search.png
kursdollara.f-noks.info/images/css/template/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-footer.png
kursdollara.f-noks.info/images/css/template/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebook_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
313 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
713 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
linkedin_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
436 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
instagram_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pinterest_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
743 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
youtube_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
445 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
twitter_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
570 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfblog_icon.png
kursdollara.f-noks.info/images/icons/socialmedia/ |
594 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onafterprint object| onbeforeprint0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kursdollara.f-noks.info
217.107.219.192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