www.account-validation.services
Open in
urlscan Pro
95.46.114.109
Malicious Activity!
Public Scan
Submission: On August 29 via automatic, source openphish
Summary
This is the only time www.account-validation.services was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 95.46.114.109 95.46.114.109 | 48666 (AS-MAROSN...) (AS-MAROSNET Moscow) | |
1 | 2a00:1450:400... 2a00:1450:4001:821::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 94.31.29.138 94.31.29.138 | 6461 (ZAYO-6461) (ZAYO-6461 - Zayo Bandwidth) | |
1 1 | 2400:cb00:204... 2400:cb00:2048:1::681c:1577 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6813:c797 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 159.45.2.180 159.45.2.180 | 10837 (WELLSFARG...) (WELLSFARGO-10837 - Wells Fargo & Company) | |
10 | 6 |
ASN48666 (AS-MAROSNET Moscow, Russia, RU)
PTR: 321433.msk-ovz.ru
www.account-validation.services |
ASN6461 (ZAYO-6461 - Zayo Bandwidth, US)
PTR: 94.31.29.138.IPYX-077437-ZYO.above.net
cdn.jsdelivr.net |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
jqueryvalidation.org |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
ASN10837 (WELLSFARGO-10837 - Wells Fargo & Company, US)
oam.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
account-validation.services
www.account-validation.services |
30 KB |
1 |
wellsfargo.com
oam.wellsfargo.com |
561 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
5 KB |
1 |
jqueryvalidation.org
1 redirects
jqueryvalidation.org |
364 B |
1 |
jsdelivr.net
cdn.jsdelivr.net |
12 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
10 | 6 |
Domain | Requested by | |
---|---|---|
6 | www.account-validation.services |
www.account-validation.services
ajax.googleapis.com |
1 | oam.wellsfargo.com |
www.account-validation.services
|
1 | cdnjs.cloudflare.com |
www.account-validation.services
|
1 | jqueryvalidation.org | 1 redirects |
1 | cdn.jsdelivr.net |
www.account-validation.services
|
1 | ajax.googleapis.com |
www.account-validation.services
|
10 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.googleapis.com Google Internet Authority G3 |
2018-08-07 - 2018-10-16 |
2 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-04-14 - 2018-10-21 |
6 months | crt.sh |
oam.wellsfargo.com Wells Fargo Public Trust Certification Authority 01 G2 |
2018-06-28 - 2020-06-28 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.account-validation.services/VerifyCard.php?2zLcj0Oti1Y6xsvjV2o5KTEo8vTzs3Q65ZSZAdjFIcef7qXoHJJMhNv3WB54iH27o5G3GCes1Lqd6jh4tCIoxAXbYAVg4g6mdnYt2LOsbTeqETkvKlEmFNAzrn3acriiux&securessl=true
Frame ID: B89E8F538DBCD7A368ADF74F45F99AE6
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
- https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
VerifyCard.php
www.account-validation.services/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
veri.css
www.account-validation.services/assets/css/ |
45 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
www.account-validation.services/assets/js/ |
17 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/ |
42 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/ Redirect Chain
|
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.js
www.account-validation.services/assets/js/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cardcheck.js
www.account-validation.services/assets/js/ |
28 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
oam.wellsfargo.com/oam/static/images/ |
43 B 561 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gf.png
www.account-validation.services/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| CardCheck function| movetoNext0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
jqueryvalidation.org
oam.wellsfargo.com
www.account-validation.services
159.45.2.180
2400:cb00:2048:1::6813:c797
2400:cb00:2048:1::681c:1577
2a00:1450:4001:821::200a
94.31.29.138
95.46.114.109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