kingscaviar.com.ua
Open in
urlscan Pro
2a00:7a60:0:10a7::1
Malicious Activity!
Public Scan
Submission: On September 08 via automatic, source openphish
Summary
This is the only time kingscaviar.com.ua was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a00:7a60:0:1... 2a00:7a60:0:10a7::1 | 200000 (UKRAINE-AS) (UKRAINE-AS) | |
19 | 159.45.2.180 159.45.2.180 | 10837 (WELLSFARG...) (WELLSFARGO-10837 - Wells Fargo & Company) | |
1 | 202.29.22.167 202.29.22.167 | 132879 (RMU-AS-AP...) (RMU-AS-AP Rajabhat Mahasarakham University) | |
21 | 4 |
ASN10837 (WELLSFARGO-10837 - Wells Fargo & Company, US)
oam.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
wellsfargo.com
oam.wellsfargo.com |
62 KB |
1 |
kingscaviar.com.ua
kingscaviar.com.ua |
3 KB |
21 | 2 |
Domain | Requested by | |
---|---|---|
19 | oam.wellsfargo.com |
kingscaviar.com.ua
|
1 | kingscaviar.com.ua | |
21 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
oam.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
oam.wellsfargo.com Symantec Class 3 Secure Server CA - G4 |
2017-01-31 - 2019-02-01 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://kingscaviar.com.ua/skin/administrator2/defaults/defaults/method/identity.php
Frame ID: 7458.1
Requests: 22 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: | Privacy, Cookies, Security & Legal
Search URL Search Domain Scan URL
Title: Sign Off
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
identity.php
kingscaviar.com.ua/skin/administrator2/defaults/defaults/method/ |
8 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.css
oam.wellsfargo.com/oam/static/css/ssep/ |
12 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.header.css
oam.wellsfargo.com/oam/static/css/ssep/ |
3 KB 580 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.button.css
oam.wellsfargo.com/oam/static/css/ssep/ |
2 KB 419 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.messaging.css
oam.wellsfargo.com/oam/static/css/ssep/ |
3 KB 694 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.input.css
oam.wellsfargo.com/oam/static/css/ssep/ |
1 KB 426 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.dropdown.selector.css
oam.wellsfargo.com/oam/static/css/ssep/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.popover.css
oam.wellsfargo.com/oam/static/css/ssep/ |
6 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.tabs.css
oam.wellsfargo.com/oam/static/css/ssep/ |
8 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.timeout.css
oam.wellsfargo.com/oam/static/css/ssep/ |
1 KB 533 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.twofa.css
oam.wellsfargo.com/oam/static/css/twofa/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
oam.wellsfargo.com/oam/static/images/ |
43 B 43 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
submit.png
202.29.22.167/arcmforum/adm/style/ |
576 B 576 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icn-ind-lock.png
oam.wellsfargo.com/oam/static/images/ |
216 B 216 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
oam.wellsfargo.com/oam/static/js/ |
94 KB 33 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nativeapp-bridge.js
oam.wellsfargo.com/oam/static/js/ |
15 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.dropdown.selector.js
oam.wellsfargo.com/oam/static/js/ssep/ |
20 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.popover.js
oam.wellsfargo.com/oam/static/js/ssep/ |
7 KB 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.tabs.js
oam.wellsfargo.com/oam/static/js/ssep/ |
3 KB 655 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tfa.js
oam.wellsfargo.com/oam/static/js/ |
15 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icn-img-wf-logo-large-glob-232x20-096741-v01_01@1x.png
oam.wellsfargo.com/oam/static/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kingscaviar.com.ua
oam.wellsfargo.com
159.45.2.180
202.29.22.167
2a00:7a60:0:10a7::1
111293483bce043cdb7773fef81c2118cfbf3664646133d0137a1f7d87c488e5
15a1c771dbbed834f8497627b7879a2f438bd4df5d3df8852c49e1f6581c479a
1905884317b7966c4f1751ee4cb9b3b1475e09dec8ffab9e6f5cc0a007c68d36
2866490e3a7a622a1ea6f39bf4bb84ebcfc6b086f59337c9614407d55f206862
29d77db13b8d350c3ea5795d1096adb8b1a0cb09da49783a2b199cd00e01f05a
312b4c2218ba79e5042794126f67aeb39f5ce20645dc9c6856c2b660345fb63a
3ca6e8859e2c9b583708de44738ffe76bcaee62d8e0a0173ff89d07d8a63ab9f
3fdfd33eba3d6bb2b68ca3f0e196fcee9df789501796cb217d3abae32a47ca8a
406bc6d065147d3ea4e58097c9500ad9b4e3e294857bb141249d7a9e24f558ba
703be68c33cb2a4fdd57e909c0182b0ab101e2905bc8a64d0c042d337e127e18
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7
9fd6c5aa6c7585c1e5e3f3a08b673813b06220d94d8b6da24b491fc03e5f968c
a0086d8d897db1d0edb598da30ecfe249c2365cf7ca85ab0aec025a6e0ef4408
a01d8ec30e2060348731f1fddcdc61849341ed3e5a7e695d72a31b3dc40cbaad
a0686edbc495d60b175d648c206ff79ebc360b5173c139937eb3ae9c54adba71
b3846c69ac0de35345d9c6e7969fa89a0e5828fbc2be889ef1922bdcd27c7cbe
b9f54c3fd4e016df4aa722cbecbf6c03f4ada4b0ad472c844fe9e6ce832af034
d97bba3cd654c4c2df13c0abc219e99691aad0276a6fd2287ca835f2f7b0214e
e241c6bf21d7b04e555352a2205e27d68a690b14084ec803cc5d748a722e112c
e2f1104899a430463d7632028c7b5cd2716148d65e7be31302449540190cce84
f08cee33c78a487ad34fabe8614fb8692b64ba054715f8190389686e21e01bcb
fd67dae89899f306faa88e597b5dea87183e55e86dc5fa7ab73aa5740ec08a1b