wellsfargoupdaterecoverybankingalerts.duckdns.org
Open in
urlscan Pro
162.240.157.12
Malicious Activity!
Public Scan
Effective URL: https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?auth&apitoken=bfa80lcrug9w1ry
Submission: On November 13 via manual from US — Scanned from US
Summary
TLS certificate: Issued by R3 on November 12th 2023. Valid for: 3 months.
This is the only time wellsfargoupdaterecoverybankingalerts.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 44.233.158.72 44.233.158.72 | 16509 (AMAZON-02) (AMAZON-02) | |
1 1 | 212.9.133.2 212.9.133.2 | 8787 (AMARISTECH) (AMARISTECH) | |
2 | 162.240.157.12 162.240.157.12 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
4 | 212.23.222.194 212.23.222.194 | 201814 (MEVSPACE) (MEVSPACE) | |
3 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-44-233-158-72.us-west-2.compute.amazonaws.com
t2m.io |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-240-157-12.unifiedlayer.com
wellsfargoupdaterecoverybankingalerts.duckdns.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
strox.nl
strox.nl |
635 KB |
3 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 223 |
92 KB |
2 |
duckdns.org
wellsfargoupdaterecoverybankingalerts.duckdns.org |
5 KB |
1 |
oerk.at
1 redirects
oerk.at |
309 B |
1 |
t2m.io
1 redirects
t2m.io — Cisco Umbrella Rank: 325572 |
334 B |
9 | 5 |
Domain | Requested by | |
---|---|---|
4 | strox.nl |
wellsfargoupdaterecoverybankingalerts.duckdns.org
strox.nl |
3 | cdnjs.cloudflare.com |
wellsfargoupdaterecoverybankingalerts.duckdns.org
cdnjs.cloudflare.com |
2 | wellsfargoupdaterecoverybankingalerts.duckdns.org |
wellsfargoupdaterecoverybankingalerts.duckdns.org
|
1 | oerk.at | 1 redirects |
1 | t2m.io | 1 redirects |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.wellsfargoupdaterecoverybankingalerts.duckdns.org R3 |
2023-11-12 - 2024-02-10 |
3 months | crt.sh |
strox.nl R3 |
2023-09-06 - 2023-12-05 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?auth&apitoken=bfa80lcrug9w1ry
Frame ID: E580C74B027EF79745D5C6F30ADF9905
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Sign inPage URL History Show full URLs
-
https://t2m.io/uek3k5
HTTP 301
https://oerk.at/19h9l HTTP 301
https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?notice-update Page URL
- https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?auth&apitoken=bfa80lcrug9w1ry Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Modernizr (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://t2m.io/uek3k5
HTTP 301
https://oerk.at/19h9l HTTP 301
https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?notice-update Page URL
- https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?auth&apitoken=bfa80lcrug9w1ry Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://t2m.io/uek3k5 HTTP 301
- https://oerk.at/19h9l HTTP 301
- https://wellsfargoupdaterecoverybankingalerts.duckdns.org/?notice-update
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
wellsfargoupdaterecoverybankingalerts.duckdns.org/ Redirect Chain
|
404 B 597 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
wellsfargoupdaterecoverybankingalerts.duckdns.org/ |
17 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csspage2.php
strox.nl/we_files/ca/ |
11 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.4/css/ |
58 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.min.js
strox.nl/we_files/lib/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
strox.nl/we_files/pics/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.jpg
strox.nl/we_files/pics/ |
599 KB 599 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-solid-900.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.4/webfonts/ |
76 KB 77 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| html5 object| Modernizr function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
oerk.at
strox.nl
t2m.io
wellsfargoupdaterecoverybankingalerts.duckdns.org
162.240.157.12
212.23.222.194
212.9.133.2
2606:4700::6811:180e
44.233.158.72
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
33f4ca05ccc2f8e3371dd2ac498b3d7f4029e72c4483ec13603c1d806b9e6af7
3e4af3f39885c55017c51ee4c68ab87c4ecb6af0d9a54417eee33d9db13b036e
8f52ae059ebd18fcb45ca5d2f81ab410ade2b54e096aa1284fd4b2b97bf3ddc9
954dd646ba96c8b4af6e0592027e18937cee696eb19a36f40383a2fdd8c0f255
99464ceb71bc9bbdcc72275faefe44f98eb5cbb6b5d8ee665b87b35376f1a96e
d2b82e612d2a812e8be2a57300dab8923c4f2edbe7a799e7da70791b595646fe
d3ee0c954f26a12702c2ad4ca5fc14fa14198eadd59113a5baef17e0c1240ebe