account-validation.info Open in urlscan Pro
95.46.114.109  Malicious Activity! Public Scan

URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjE...
Submission: On August 30 via automatic, source phishtank

Summary

This website contacted 6 IPs in 3 countries across 6 domains to perform 10 HTTP transactions. The main IP is 95.46.114.109, located in Czech Republic and belongs to AS-MAROSNET Moscow, Russia, RU. The main domain is account-validation.info.
This is the only time account-validation.info was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
6 95.46.114.109 48666 (AS-MAROSN...)
1 2a00:1450:400... 15169 (GOOGLE)
1 151.101.14.109 54113 (FASTLY)
1 1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 159.45.2.180 10837 (WELLSFARG...)
10 6
Domain Requested by
6 account-validation.info account-validation.info
ajax.googleapis.com
1 oam.wellsfargo.com account-validation.info
1 cdnjs.cloudflare.com account-validation.info
1 jqueryvalidation.org 1 redirects
1 cdn.jsdelivr.net account-validation.info
1 ajax.googleapis.com account-validation.info
10 6

This site contains no links.

Subject Issuer Validity Valid
*.googleapis.com
Google Internet Authority G3
2018-08-14 -
2018-10-23
2 months crt.sh
ssl412106.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-04-14 -
2018-10-21
6 months crt.sh
oam.wellsfargo.com
Wells Fargo Public Trust Certification Authority 01 G2
2018-06-28 -
2020-06-28
2 years crt.sh

This page contains 1 frames:

Primary Page: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Frame ID: 0703B5576CB71A8EE30D8D6AA59178D6
Requests: 11 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

10
Requests

30 %
HTTPS

50 %
IPv6

6
Domains

6
Subdomains

6
IPs

3
Countries

81 kB
Transfer

258 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 4
  • http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
  • https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request VerifyCard.php
account-validation.info/
6 KB
3 KB
Document
General
Full URL
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Server
95.46.114.109 , Czech Republic, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
321433.msk-ovz.ru
Software
nginx/1.12.2 /
Resource Hash
938c8b635aafe34c4fae9bed244251955f7cd42c51c7ac2369307c775c8d88ce

Request headers

Host
account-validation.info
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
0703B5576CB71A8EE30D8D6AA59178D6

Response headers

Server
nginx/1.12.2
Date
Thu, 30 Aug 2018 12:09:35 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
2696
Connection
keep-alive
Vary
Accept-Encoding
Content-Encoding
gzip
veri.css
account-validation.info/assets/css/
45 KB
12 KB
Stylesheet
General
Full URL
http://account-validation.info/assets/css/veri.css
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Server
95.46.114.109 , Czech Republic, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
321433.msk-ovz.ru
Software
nginx/1.12.2 /
Resource Hash
b179f7ca80c22a676603179fa6cdd30a19465c39c39842b8fe1d0b6256082cbd

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
account-validation.info
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:35 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Jan 2018 10:26:54 GMT
Server
nginx/1.12.2
ETag
"b4a9-561c889a1f780-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
11723
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/
91 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2a00:1450:4001:81d::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
61c6caebd23921741fb5ffe6603f16634fca9840c2bf56ac8201e9264d6daccf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 27 Aug 2018 22:01:01 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
223714
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
33593
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 27 Aug 2019 22:01:01 GMT
jquery.payment.js
account-validation.info/assets/js/
17 KB
4 KB
Script
General
Full URL
http://account-validation.info/assets/js/jquery.payment.js
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Server
95.46.114.109 , Czech Republic, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
321433.msk-ovz.ru
Software
nginx/1.12.2 /
Resource Hash
60499c4335239d51fa6ef40bd909ba8e62a2a468b16b74f0fd9fadac1eee4bbf

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
account-validation.info
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Jan 2018 10:27:30 GMT
Server
nginx/1.12.2
ETag
"421b-561c88bc74880-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
3493
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/
42 KB
12 KB
Script
General
Full URL
http://cdn.jsdelivr.net/jquery.validation/1.14.0/jquery.validate.js
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Server
151.101.14.109 San Francisco, United States, ASN54113 (FASTLY - Fastly, US),
Reverse DNS
Software
/
Resource Hash
ad5da6112553bd7511aea64dd18d23cef797432148142d766424c900dd919d0a
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:35 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
ETag
"a686-lD4vCzGkRPW9lmVTvUVEazM4/T0"
Vary
Accept-Encoding
X-Cache
HIT, HIT
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
*
Cache-Control
public, max-age=31536000, s-maxage=31536000, immutable
Connection
keep-alive
Accept-Ranges
bytes
Timing-Allow-Origin
*
Content-Length
11438
X-Served-By
cache-ams4120-AMS, cache-fra19125-FRA
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/
Redirect Chain
  • http://jqueryvalidation.org/files/dist/additional-methods.min.js
  • https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
17 KB
5 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
SPDY
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
2400:cb00:2048:1::6813:c497 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8b1554032d2cfbf0e858518df6460b2b4336be2cfb1f188dfd1108a3ae50b2e8
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Thu, 30 Aug 2018 12:09:35 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
status
200
served-in-seconds
0.001
last-modified
Thu, 17 May 2018 09:20:58 GMT
server
cloudflare
etag
W/"5afd497a-4587"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
4527263edd0e2774-FRA
expires
Tue, 20 Aug 2019 12:09:35 GMT

Redirect headers

Date
Thu, 30 Aug 2018 12:09:35 GMT
Server
cloudflare
Vary
Accept-Encoding
Location
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
Cache-Control
max-age=3600
Transfer-Encoding
chunked
Connection
keep-alive
CF-RAY
4527263ec4c363c7-FRA
Expires
Thu, 30 Aug 2018 13:09:35 GMT
jquery.maskedinput.js
account-validation.info/assets/js/
10 KB
3 KB
Script
General
Full URL
http://account-validation.info/assets/js/jquery.maskedinput.js
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Server
95.46.114.109 , Czech Republic, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
321433.msk-ovz.ru
Software
nginx/1.12.2 /
Resource Hash
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
account-validation.info
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Jan 2018 10:27:30 GMT
Server
nginx/1.12.2
ETag
"284d-561c88bc74880-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2647
cardcheck.js
account-validation.info/assets/js/
28 KB
7 KB
Script
General
Full URL
http://account-validation.info/assets/js/cardcheck.js
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Server
95.46.114.109 , Czech Republic, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
321433.msk-ovz.ru
Software
nginx/1.12.2 /
Resource Hash
6ccf4fd58cfc81f14bc1cb330bd9f0bce4e6f16e829380c0e39033d48b8c5719

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
account-validation.info
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:36 GMT
Content-Encoding
gzip
Last-Modified
Tue, 02 Jan 2018 10:27:28 GMT
Server
nginx/1.12.2
ETag
"6e57-561c88ba8c400-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
6637
shim.gif
oam.wellsfargo.com/oam/static/images/
43 B
561 B
Image
General
Full URL
https://oam.wellsfargo.com/oam/static/images/shim.gif
Requested by
Host: account-validation.info
URL: http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
159.45.2.180 , United States, ASN10837 (WELLSFARGO-10837 - Wells Fargo & Company, US),
Reverse DNS
Software
KONICHIWA/1.1 /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://account-validation.info/VerifyCard.php?k5wormQpRqaaLmADM1zFg9MkAKf5VqpuWjSzwqnqDX2bhhA1bxD13t5vpCr5lFmiuWXDTWAY9OcjM9OjEFvaV5LJKV4L1tZtOIQIknngr5ESaJxlHSZvU78qHzMVAWZI6e&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:36 GMT
X-Content-Type-Options
nosniff
Last-Modified
Wed, 08 Aug 2018 01:29:20 GMT
Server
KONICHIWA/1.1
X-Frame-Options
SAMEORIGIN
F5-trid-name
tfbe_app_jkr, bwtf_app_jfd
Strict-Transport-Security
max-age=31536000; includeSubdomains;
Content-Type
image/gif
X-XSS-Protection
1; mode=block
F5-trid-value
1535630974433, 1535629251680
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
ETag
"2b-572e2709945f4"
gf.png
account-validation.info/assets/img/
2 KB
2 KB
Image
General
Full URL
http://account-validation.info/assets/img/gf.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Protocol
HTTP/1.1
Server
95.46.114.109 , Czech Republic, ASN48666 (AS-MAROSNET Moscow, Russia, RU),
Reverse DNS
321433.msk-ovz.ru
Software
nginx/1.12.2 /
Resource Hash
1905884317b7966c4f1751ee4cb9b3b1475e09dec8ffab9e6f5cc0a007c68d36

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
account-validation.info
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://account-validation.info/assets/css/veri.css
Connection
keep-alive
Cache-Control
no-cache
Referer
http://account-validation.info/assets/css/veri.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Thu, 30 Aug 2018 12:09:36 GMT
Last-Modified
Tue, 02 Jan 2018 10:27:08 GMT
Server
nginx/1.12.2
ETag
"870-561c88a779700"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2160
truncated
/
270 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e2f1104899a430463d7632028c7b5cd2716148d65e7be31302449540190cce84

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery function| CardCheck function| movetoNext

0 Cookies