www.coolrays.pk
Open in
urlscan Pro
192.185.118.175
Malicious Activity!
Public Scan
Submission: On March 04 via automatic, source openphish
Summary
This is the only time www.coolrays.pk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 192.185.118.175 192.185.118.175 | 20013 (CYRUSONE) (CYRUSONE - CyrusOne LLC) | |
6 | 159.45.2.154 159.45.2.154 | 10837 (WELLSFARG...) (WELLSFARGO-10837 - Wells Fargo & Company) | |
4 | 2.21.246.179 2.21.246.179 | 20940 (AKAMAI-ASN1 ) (AKAMAI-ASN1 ) | |
13 | 4 |
ASN20013 (CYRUSONE - CyrusOne LLC, US)
PTR: 192-185-118-175.unifiedlayer.com
www.coolrays.pk |
ASN10837 (WELLSFARGO-10837 - Wells Fargo & Company, US)
PTR: online.wellsfargo.com
online.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
wellsfargo.com
online.wellsfargo.com |
36 KB |
4 |
akamai.net
a248.e.akamai.net |
2 KB |
1 |
coolrays.pk
www.coolrays.pk |
5 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
13 | 4 |
Domain | Requested by | |
---|---|---|
6 | online.wellsfargo.com |
www.coolrays.pk
|
4 | a248.e.akamai.net |
www.coolrays.pk
|
1 | www.coolrays.pk | |
0 | Failed | |
13 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
online.wellsfargo.com |
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
online.wellsfargo.com Symantec Class 3 Secure Server CA - G4 |
2016-10-28 - 2018-10-29 |
2 years | crt.sh |
a248.e.akamai.net Symantec Class 3 ECC 256 bit SSL CA - G2 |
2016-07-28 - 2017-07-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.coolrays.pk/css/www/wells-fargo/com/account%20update/questions.htm
Frame ID: 9242.1
Requests: 13 HTTP requests in this frame
3 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
questions.htm
www.coolrays.pk/css/www/wells-fargo/com/account%20update/ |
20 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
wfwiblib.js
online.wellsfargo.com/common/scripts/ |
30 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
vudu.css
online.wellsfargo.com/common/styles/ |
26 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
wibscreen.css
online.wellsfargo.com/common/styles/ |
105 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
mm.css
online.wellsfargo.com/common/styles/ |
19 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
a248.e.akamai.net/7/248/3608/1d8352905f2c38/online.wellsfargo.com/common/images/ |
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_62sq.gif
a248.e.akamai.net/7/248/3608/bb61162e7a787f/online.wellsfargo.com/common/images/ |
616 B 616 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tagline_consumer.gif
a248.e.akamai.net/7/248/3608/b7f14699958abc/online.wellsfargo.com/common/images/ |
937 B 937 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
al_ehl_house_gen.gif
a248.e.akamai.net/7/248/3608/9dc0d2cce8830d/online.wellsfargo.com/common/images/ |
111 B 111 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wibprint.css
online.wellsfargo.com/common/styles/ |
2 KB 973 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
securityguarantee.gif
online.wellsfargo.com/common/styles/images/ |
67 B 67 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
/G:/Petologyz/common/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
favicon.ico
/G:/Petologyz/common/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a248.e.akamai.net
online.wellsfargo.com
www.coolrays.pk
159.45.2.154
192.185.118.175
2.21.246.179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