www.fargo-1mobile.site
Open in
urlscan Pro
185.234.219.222
Malicious Activity!
Public Scan
Effective URL: https://www.fargo-1mobile.site/wfad/
Submission: On March 24 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 23rd 2020. Valid for: 3 months.
This is the only time www.fargo-1mobile.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 4 | 185.234.219.222 185.234.219.222 | 210273 (WHF-LTD-AS) (WHF-LTD-AS) | |
1 | 13.35.254.6 13.35.254.6 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 67.202.94.94 67.202.94.94 | 32748 (STEADFAST) (STEADFAST) | |
5 | 4 |
ASN16509 (AMAZON-02, US)
PTR: server-13-35-254-6.fra6.r.cloudfront.net
dg6qn11ynnp6a.cloudfront.net |
ASN32748 (STEADFAST, US)
PTR: amung.us
waust.at | |
whos.amung.us |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
fargo-1mobile.site
2 redirects
www.fargo-1mobile.site |
2 KB |
1 |
amung.us
whos.amung.us |
146 B |
1 |
waust.at
waust.at |
7 KB |
1 |
cloudfront.net
dg6qn11ynnp6a.cloudfront.net |
31 KB |
5 | 4 |
Domain | Requested by | |
---|---|---|
4 | www.fargo-1mobile.site |
2 redirects
www.fargo-1mobile.site
|
1 | whos.amung.us |
waust.at
|
1 | waust.at |
www.fargo-1mobile.site
|
1 | dg6qn11ynnp6a.cloudfront.net |
www.fargo-1mobile.site
|
5 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
whos.amung.us |
Subject Issuer | Validity | Valid | |
---|---|---|---|
fargo-1mobile.site Let's Encrypt Authority X3 |
2020-03-23 - 2020-06-21 |
3 months | crt.sh |
*.cloudfront.net DigiCert Global CA G2 |
2019-07-17 - 2020-07-05 |
a year | crt.sh |
whos.amung.us GeoTrust EV RSA CA 2018 |
2018-03-09 - 2020-05-25 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.fargo-1mobile.site/wfad/
Frame ID: F5B0D12E588EFF3E0C07962893235D96
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.fargo-1mobile.site/
HTTP 302
https://www.fargo-1mobile.site/wfad HTTP 301
https://www.fargo-1mobile.site/wfad/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: 89
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.fargo-1mobile.site/
HTTP 302
https://www.fargo-1mobile.site/wfad HTTP 301
https://www.fargo-1mobile.site/wfad/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.fargo-1mobile.site/wfad/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gen_validatorv2.js
www.fargo-1mobile.site/wfad/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargo200x200.jpg
dg6qn11ynnp6a.cloudfront.net/wp-content/uploads/2016/02/02144636/ |
30 KB 31 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
d.js
waust.at/ |
13 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
30 B 146 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| _wau string| wau_w_col string| wau_w_siz object| WAU_ren function| WAU_dynamic function| WAU_dynamic_request function| WAU_r_d function| WAU_insert function| WAU_la function| WAU_addCommas function| WAU_lrd function| WAU_cps function| docReady object| x string| x1 string| x20 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dg6qn11ynnp6a.cloudfront.net
waust.at
whos.amung.us
www.fargo-1mobile.site
13.35.254.6
185.234.219.222
67.202.94.94
6f4587fb64cd2e7ce26ba21941c80f3ab8d28c257b73d04a87c949b32e4cde2d
d7d5d5846921c7cdc41723f3ba4712aae94e175bc97ca773326189e435b36802
e0435b7d2869ef2da9c06934a39e6d6428063d7b67756355e876700e6d49f0ab
e3c917d8662bb735af6aa8a13a53708f7d5f179663ff7e301e40385635eb411c
f2163d39d322368519ce2c0be0df0bd01b4f7b152d1f5b2dc098b3d0ff026be5