linkhelp-wellsfargo.com
Open in
urlscan Pro
74.201.28.105
Malicious Activity!
Public Scan
Submission: On June 08 via automatic, source openphish
Summary
This is the only time linkhelp-wellsfargo.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 74.201.28.105 74.201.28.105 | 35913 (DEDIPATH-LLC) (DEDIPATH-LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:809::2001 | 15169 (GOOGLE) (GOOGLE) | |
9 | 3 |
ASN35913 (DEDIPATH-LLC, US)
PTR: anothersection.impactflower.com
linkhelp-wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
linkhelp-wellsfargo.com
linkhelp-wellsfargo.com |
568 KB |
1 |
blogspot.com
cssjas.blogspot.com |
|
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | linkhelp-wellsfargo.com |
linkhelp-wellsfargo.com
|
1 | cssjas.blogspot.com |
linkhelp-wellsfargo.com
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
misc-sni.blogspot.com GTS CA 1C3 |
2021-05-10 - 2021-08-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://linkhelp-wellsfargo.com/wells_fargo/Myaccounts.php?id=Myaccount
Frame ID: 6080427B236BA9B77143984961E8A4C9
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- script /angular.*\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
Myaccounts.php
linkhelp-wellsfargo.com/wells_fargo/ |
16 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
linkhelp-wellsfargo.com/wells_fargo/style/js/ |
163 KB 163 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
linkhelp-wellsfargo.com/wells_fargo/style/js/ |
286 KB 286 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
linkhelp-wellsfargo.com/wells_fargo/style/js/ |
49 KB 49 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
linkhelp-wellsfargo.com/wells_fargo/style/js/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
linkhelp-wellsfargo.com/wells_fargo/style/css/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo1.png
linkhelp-wellsfargo.com/wells_fargo/style/css/ |
12 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rooro.png
linkhelp-wellsfargo.com/wells_fargo/style/css/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
cssjas.blogspot.com/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| angular function| $ function| jQuery function| numbersOnly function| digitsOnly function| allowedChars function| isOneOf1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
linkhelp-wellsfargo.com/ | Name: PHPSESSID Value: cd727d86f854b95ee14e40d12e476b91 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cssjas.blogspot.com
linkhelp-wellsfargo.com
2a00:1450:4001:809::2001
74.201.28.105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