noodleking.com.tr
Open in
urlscan Pro
95.173.177.114
Malicious Activity!
Public Scan
Submission Tags: tweet @atomspam #phishing #wellsfargo #financial #banking #infosec #cybersecurity #atomspam Search All
Submission: On March 18 via api from FI — Scanned from FI
Summary
TLS certificate: Issued by R3 on February 28th 2023. Valid for: 3 months.
This is the only time noodleking.com.tr was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 95.173.177.114 95.173.177.114 | 51559 (NETINTERN...) (NETINTERNET Netinternet Bilisim Teknolojileri AS) | |
12 | 23.213.161.211 23.213.161.211 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2.16.187.59 2.16.187.59 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 104.79.24.15 104.79.24.15 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
3 | 104.109.70.8 104.109.70.8 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 143.204.89.10 143.204.89.10 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 100.20.69.209 100.20.69.209 | 16509 (AMAZON-02) (AMAZON-02) | |
24 | 9 |
ASN51559 (NETINTERNET Netinternet Bilisim Teknolojileri AS, TR)
PTR: boss.hozzt.com
noodleking.com.tr |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-213-161-211.deploy.static.akamaitechnologies.com
connect.secure.wellsfargo.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a2-16-187-59.deploy.static.akamaitechnologies.com
static.wellsfargo.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-79-24-15.deploy.static.akamaitechnologies.com
www10.wellsfargomedia.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-109-70-8.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-89-10.fra50.r.cloudfront.net
cdn.appdynamics.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-100-20-69-209.us-west-2.compute.amazonaws.com
col.eum-appdynamics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
wellsfargo.com
connect.secure.wellsfargo.com — Cisco Umbrella Rank: 12937 static.wellsfargo.com — Cisco Umbrella Rank: 12331 |
817 KB |
4 |
wellsfargomedia.com
www10.wellsfargomedia.com — Cisco Umbrella Rank: 16146 www15.wellsfargomedia.com — Cisco Umbrella Rank: 25717 |
716 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 194 |
25 KB |
2 |
noodleking.com.tr
noodleking.com.tr |
10 KB |
1 |
eum-appdynamics.com
col.eum-appdynamics.com — Cisco Umbrella Rank: 2800 |
732 B |
1 |
appdynamics.com
cdn.appdynamics.com — Cisco Umbrella Rank: 3515 |
19 KB |
24 | 6 |
Domain | Requested by | |
---|---|---|
12 | connect.secure.wellsfargo.com |
noodleking.com.tr
connect.secure.wellsfargo.com |
3 | www15.wellsfargomedia.com |
connect.secure.wellsfargo.com
|
2 | static.wellsfargo.com |
noodleking.com.tr
|
2 | cdnjs.cloudflare.com |
noodleking.com.tr
cdnjs.cloudflare.com |
2 | noodleking.com.tr |
noodleking.com.tr
|
1 | col.eum-appdynamics.com |
cdn.appdynamics.com
|
1 | cdn.appdynamics.com |
static.wellsfargo.com
|
1 | www10.wellsfargomedia.com |
noodleking.com.tr
|
24 | 8 |
This site contains links to these domains. Also see Links.
Domain |
---|
oam.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sushishop.com.tr R3 |
2023-02-28 - 2023-05-29 |
3 months | crt.sh |
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2022-10-11 - 2023-10-11 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
static.wellsfargo.com DigiCert EV RSA CA G2 |
2022-10-12 - 2023-10-12 |
a year | crt.sh |
www10.wellsfargomedia.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-04-05 - 2023-04-05 |
a year | crt.sh |
www15.wellsfargomedia.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-11-14 - 2023-11-16 |
a year | crt.sh |
*.appdynamics.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-07-17 - 2023-07-22 |
a year | crt.sh |
*.eum-appdynamics.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-14 - 2023-07-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://noodleking.com.tr/wells/auth/login/present.php
Frame ID: 2E37D505B02054385EDC0AAF3AC7D65C
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
Sign On to View Your Personal Accounts | Wells FargoDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
AppDynamics (Analytics) Expand
Detected patterns
- adrum
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Create a new password
Search URL Search Domain Scan URL
Title: find your username
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
present.php
noodleking.com.tr/wells/auth/login/ |
30 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
53 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
general_alt.js
noodleking.com.tr/wells/auth/login/auth/login/static/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.13.0/css/ |
57 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfui.4bdda2282747ed96f876.chunk.css
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/stylesheets/ |
98 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.b3b5f355e18c2c42a801.chunk.css
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/stylesheets/ |
12 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adrum-ext.js
static.wellsfargo.com/auth/static/scripts/ |
45 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glu.js
connect.secure.wellsfargo.com/AIDO/ |
68 KB 37 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mint.js
connect.secure.wellsfargo.com/AIDO/ |
254 KB 134 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pic.js
connect.secure.wellsfargo.com/PIDO/ |
88 KB 51 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
COB-BOB-IRT-enroll_park.jpg
www10.wellsfargomedia.com/auth/static/images/ |
644 KB 646 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfui.74d5a35a9db29e7083cc.chunk.js
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/js/ |
793 KB 200 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.20e6281f5c888726b87d.chunk.js
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/js/ |
525 KB 171 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.ffd5859465d719859fd2.chunk.js
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/js/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.js
static.wellsfargo.com/tracking/secure-auth/ |
33 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.min.js
connect.secure.wellsfargo.com/auth/static/prefs/ |
261 KB 148 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
connect.secure.wellsfargo.com/auth/static/prefs/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargoserif-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
26 KB 26 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-regular-400.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.13.0/webfonts/ |
13 KB 14 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adrum-ext.b4436be974de477658d4a93afb752165.js
cdn.appdynamics.com/ |
47 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vyHb
connect.secure.wellsfargo.com/AIDO/ |
90 B 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
89 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
adrum
col.eum-appdynamics.com/eumcollector/beacons/browser/v1/APP_KEY_NOT_SET/ |
0 732 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)165 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless string| nsgva string| NDS_LISTEN_FOCUS string| NDS_LISTEN_TOUCH string| NDS_LISTEN_KEYBOARD string| NDS_LISTEN_DEVICE_MOTION_SENSORS string| NDS_LISTEN_MOUSE function| nslmns string| NDS_LISTEN_FORM string| NDS_LISTEN_ALL string| NDS_LISTEN_NONE string| nsptj string| nsgvapggcj string| nsmbw function| nsconh string| nsevz string| nsevzwneir string| nsttw string| nsmbwine string| nsgwio string| nsevzw function| nslmnsef string| nsgwiozdvs string| nsevzwnei function| nsttwwwvtp function| nsgfyhsv string| nsttwwwv object| nsconhs function| nsvpmwvgck function| nsrqyz function| HashUtil function| nsrqy function| nspevw function| ndoIsKeyIncluded function| ndoIsModifierKey function| ndoIsNavigationKey function| ndoIsEditingKey function| nsrqyznvqv object| KEYBOARD_LOCATION object| KEY_TYPE_AND_LOCATION function| ndoGetKeyboardLocation function| ndoGetKeyTypeAndLocationIndicator function| ndoGetObjectKeys function| nsnehuyx function| nsgfyhsvoq boolean| nsgvapg string| ndjsStaticVersion function| nsrjzzxg object| nsttww object| nsmbwiner boolean| nsevzwne number| nsptjlh number| nsptjlhpfg object| nsgvap object| nsgwioz object| nsmbwinerz object| nsevzwn object| nsconhsgif object| nsgwi boolean| nscon string| nslmnse function| ndwti object| nsptjlhpf object| nsmbwi object| nds object| nsgwiozd function| nsneh number| numQueries object| returned string| version function| nsgfyhsvo string| ndsWidgetVersion undefined| nsgvapgg string| nsgwiozdv string| nsgvapggc string| nslmnsefo function| nsnehu string| nsttwwwvt function| nsrjz function| nsvpm function| nsgldvqk string| nsptjlhp string| nsconhsgi object| nsmbwin object| nslmn function| nslmnsefoo function| nsiojwnwkt function| nsconhsg function| nsttwww function| nsnehuyxp function| nsgldvqkfn function| nsgfyhs function| nsvpmwv function| nspevwoc function| nsgfyh function| nsiojwnw function| nsiojw function| nsrqyznvq function| nsrjzzxgt function| nsgldv function| validateSessionIdCookie function| nsvpmw function| nsrjzzx function| nsgld function| attachEventListener function| nsgldvq function| nspevwockd function| nsrjzzxgtr function| ndwts function| nsioj function| nsiojwn function| nsrjzz function| getEnabledEvents object| nsptjl function| nsiojwnwk object| ndsapi string| webId string| ndURI object| ADRUM number| adrum-start-time object| webpackJsonp boolean| isNative number| counter boolean| utag_condload undefined| new_path undefined| utag_cfg_ovrd undefined| userAgentArr object| utag function| isNotUndefinedOrNull function| getDocumentTitleLabel function| sendDataToGA boolean| __tealium_twc_switch object| utag_data object| ___sc124934 object| ___so124934 number| CLIWHIT string| PSESSIONID string| SSESSIONID string| LSESSIONID object| __tp number| __gt string| ATADUN_PATH object| loginUrlBase object| scriptParent object| loginUrlBaseNoProtocol object| getUrl string| host string| port undefined| guid function| appendFIDOEligibleInputs function| disableSubmitsCollectUserPrefs function| base64EncodingforNDSPMD function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent function| undoSaveUsername function| maskedUsernameChanged function| addScriptElement function| getCookie function| appendHiddenInput function| addCookiesToForm function| setWFACookies function| generateGuid undefined| brief function| grip3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
noodleking.com.tr/ | Name: PHPSESSID Value: d7b899e0d7f2fbcb749aea22df6c5312 |
|
.noodleking.com.tr/ | Name: utag_main Value: v_id:0186f467a73f00022de515fb55ad03073003606b00b08$_sn:1$_se:1$_ss:1$_st:1679139479168$ses_id:1679137679168%3Bexp-session$_pn:1%3Bexp-session |
|
noodleking.com.tr/ | Name: LSESSIONID Value: eyJpIjoiRlk5MEhiU0RwR0I1MTNhR0p3TlB4Zz09IiwiZSI6ImVqMThIZkdDeVoxVXJXeTZrRGZcL0ZXMW16YzhqWUZDOFRId2l2SHVkTWxWZ1N6ZlQ0V05Yb2NSRXJCRDNQQ0syVFEwZFZya2ZiNHc0aGlBRUhIdURjaWpQcUppZ1VsaFJWbzhUNVdDTmxWWXlMT2NuejZxTW5sRnIrcWF1UlhZc016Mk05cDZNQ3B2RUhkNktLc1NvUlE9PSJ9.67d25ddf0938313a.M2U3NjA4MzQ1NTM5NDQyZTM3ZGJlZGJjZTZjNmVmNzQwN2JkY2JlMGMxYzI1MWM2MmFkNjJkYTE1NGI2MGRiNg%3D%3D |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.appdynamics.com
cdnjs.cloudflare.com
col.eum-appdynamics.com
connect.secure.wellsfargo.com
noodleking.com.tr
static.wellsfargo.com
www10.wellsfargomedia.com
www15.wellsfargomedia.com
100.20.69.209
104.109.70.8
104.79.24.15
143.204.89.10
2.16.187.59
23.213.161.211
2606:4700::6811:190e
95.173.177.114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