mail.basiaec.co.za
Open in
urlscan Pro
154.0.174.176
Malicious Activity!
Public Scan
Submission: On October 14 via automatic, source openphish — Scanned from DE
Summary
This is the only time mail.basiaec.co.za was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 154.0.174.176 154.0.174.176 | 37611 (Afrihost) (Afrihost) | |
1 | 159.45.170.156 159.45.170.156 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
15 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
basiaec.co.za
mail.basiaec.co.za |
99 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
17 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | mail.basiaec.co.za |
mail.basiaec.co.za
|
1 | connect.secure.wellsfargo.com |
mail.basiaec.co.za
|
15 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://mail.basiaec.co.za/Wells%20Fargo%20/wells.htm
Frame ID: 3C691E1D35A00EC6E6CF15008EEEE545
Requests: 15 HTTP requests in this frame
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Learn More
Search URL Search Domain Scan URL
Title: Frequently asked questions >
Search URL Search Domain Scan URL
Title: Email Security Help
Search URL Search Domain Scan URL
Title: www.wellsfargo.com/agreement
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
wells.htm
mail.basiaec.co.za/Wells%20Fargo%20/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signonCommitment.css
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
144 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
10 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
1 KB 975 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wflogo-gfrewards.png
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.2.2.js
mail.basiaec.co.za/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
mail.basiaec.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
mail.basiaec.co.za/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search_corner.gif
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
mail.basiaec.co.za/Wells%20Fargo%20/wells_files/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
mail.basiaec.co.za/images/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)108 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| antiClickjack string| webId string| ndURI object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged boolean| m object| q object| options object| lun3 boolean| isNative object| ndsapi object| nds object| js object| fjs function| ndoGetObjectKeys function| nstnbqxfk function| nsjabhrors function| nsjabh boolean| nsirlzd string| ndjsStaticVersion object| nsqrye function| nstnbqxf function| validateSessionIdCookie object| nsjabhr boolean| nsqryer number| nsdskaqrty number| nsmsdmgv object| nstnbq object| nsmsd function| nsdsk object| nsjabhror function| nsmsdm object| nsirl object| nsqryereb object| nsmsdmgvhg boolean| nsirlzdgcv function| nsdskaq function| nsqryere string| nstnbqx function| nsirlzdgc function| nsrpl string| nsrpljsi number| numQueries function| nsqryerebn object| returned string| version function| nsltoxfcgn string| nsmsdmgvh function| nsqry function| nsrpljsiu string| nstnbqxfkb string| nsltoxf string| nsjab string| nsdskaqr string| nsltox string| nsltoxfc object| nsirlz object| nsdskaqrt function| nsdska function| nsmsdmg function| nsrpljsiua function| nsirlzdg function| nslto function| nsrpljs function| nsrplj function| nstnb function| nsltoxfcg function| nsast function| nsulmwqgw function| nsvima function| nsbnkamxi function| nsastd function| nsauoadlf function| nsastdnect function| nsbnkamx function| nsvimaox function| nstat function| nsastdnec function| nstatb function| nsauoadl function| nsvimaoxus function| nshixpmv function| ndwts function| HashUtil function| nsauo function| nsauoa function| nshixpm function| nshix function| nsuzm function| nsuzmyafpf function| nsastdne function| ndwti function| nsvimao object| nsjabhro function| nsulmwqg function| nsulmwqgwk0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
mail.basiaec.co.za
154.0.174.176
159.45.170.156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