setup.kiwi.net.ua
Open in
urlscan Pro
2a00:7a60:0:107b::1
Malicious Activity!
Public Scan
Submission: On April 06 via automatic, source openphish
Summary
This is the only time setup.kiwi.net.ua was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a00:7a60:0:1... 2a00:7a60:0:107b::1 | 200000 (UKRAINE-AS) (UKRAINE-AS) | |
6 | 159.45.66.154 159.45.66.154 | 4196 (WELLSFARG...) (WELLSFARGO-4196 - Wells Fargo & Company) | |
4 | 92.122.213.219 92.122.213.219 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
13 | 4 |
ASN4196 (WELLSFARGO-4196 - Wells Fargo & Company, US)
PTR: online.wellsfargo.com
online.wellsfargo.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a92-122-213-219.deploy.akamaitechnologies.com
a248.e.akamai.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
wellsfargo.com
online.wellsfargo.com |
36 KB |
4 |
akamai.net
a248.e.akamai.net |
2 KB |
1 |
kiwi.net.ua
setup.kiwi.net.ua |
4 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
13 | 4 |
Domain | Requested by | |
---|---|---|
6 | online.wellsfargo.com |
setup.kiwi.net.ua
|
4 | a248.e.akamai.net |
setup.kiwi.net.ua
|
1 | setup.kiwi.net.ua | |
0 | Failed | |
13 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
online.wellsfargo.com |
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
online.wellsfargo.com Symantec Class 3 Secure Server CA - G4 |
2016-10-28 - 2018-10-29 |
2 years | crt.sh |
a248.e.akamai.net Symantec Class 3 ECC 256 bit SSL CA - G2 |
2016-07-28 - 2017-07-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://setup.kiwi.net.ua/bb/clients/questionreviews.php
Frame ID: 7006.1
Requests: 13 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
questionreviews.php
setup.kiwi.net.ua/bb/clients/ |
15 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
wfwiblib.js
online.wellsfargo.com/common/scripts/ |
30 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
vudu.css
online.wellsfargo.com/common/styles/ |
26 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
wibscreen.css
online.wellsfargo.com/common/styles/ |
105 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
mm.css
online.wellsfargo.com/common/styles/ |
19 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
a248.e.akamai.net/7/248/3608/1d8352905f2c38/online.wellsfargo.com/common/images/ |
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_62sq.gif
a248.e.akamai.net/7/248/3608/bb61162e7a787f/online.wellsfargo.com/common/images/ |
616 B 616 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tagline_consumer.gif
a248.e.akamai.net/7/248/3608/b7f14699958abc/online.wellsfargo.com/common/images/ |
937 B 937 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
al_ehl_house_gen.gif
a248.e.akamai.net/7/248/3608/9dc0d2cce8830d/online.wellsfargo.com/common/images/ |
111 B 111 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wibprint.css
online.wellsfargo.com/common/styles/ |
2 KB 973 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
securityguarantee.gif
online.wellsfargo.com/common/styles/images/ |
67 B 67 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
/G:/Petologyz/common/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
/G:/Petologyz/common/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a248.e.akamai.net
online.wellsfargo.com
setup.kiwi.net.ua
159.45.66.154
2a00:7a60:0:107b::1
92.122.213.219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