www.verify-account6547.ns02.info
Open in
urlscan Pro
3.82.127.17
Malicious Activity!
Public Scan
Effective URL: https://www.verify-account6547.ns02.info/Login/?token=
Submission: On December 25 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on December 25th 2021. Valid for: 3 months.
This is the only time www.verify-account6547.ns02.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 3.82.127.17 3.82.127.17 | 14618 (AMAZON-AES) (AMAZON-AES) | |
10 | 1 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-82-127-17.compute-1.amazonaws.com
www.verify-account6547.ns02.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
ns02.info
www.verify-account6547.ns02.info |
312 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.verify-account6547.ns02.info |
www.verify-account6547.ns02.info
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
verify-account6547.ns02.info cPanel, Inc. Certification Authority |
2021-12-25 - 2022-03-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.verify-account6547.ns02.info/Login/?token=
Frame ID: B02807CEC524C85F346598E38CEE675C
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Sign On to View Your Personal Accounts | Wells FargoPage URL History Show full URLs
- https://www.verify-account6547.ns02.info/ Page URL
- https://www.verify-account6547.ns02.info/Login/?token= Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.verify-account6547.ns02.info/ Page URL
- https://www.verify-account6547.ns02.info/Login/?token= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.verify-account6547.ns02.info/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cf.css
www.verify-account6547.ns02.info/Export/css/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
www.verify-account6547.ns02.info/Login/ |
56 KB 56 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfui.css
www.verify-account6547.ns02.info/Export/css/ |
140 KB 140 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.verify-account6547.ns02.info/Export/css/ |
22 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
www.verify-account6547.ns02.info/Export/img/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.js
www.verify-account6547.ns02.info/Export/js/ |
13 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-rg.woff2
www.verify-account6547.ns02.info/Export/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-sbd.woff2
www.verify-account6547.ns02.info/Export/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargoserif-rg.woff2
www.verify-account6547.ns02.info/Export/fonts/ |
26 KB 26 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| username object| thing1 object| thing2 object| border1 object| password object| gniht1 object| gniht2 object| border2 object| checkbox object| checkbox2 object| hide object| eye object| errorMsg object| form object| btnSubmit1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.verify-account6547.ns02.info/ | Name: PHPSESSID Value: 3541cc6842f22baa3dc4190ac2161517 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.verify-account6547.ns02.info
3.82.127.17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