www04-auth-fidelity-session.duckdns.org
Open in
urlscan Pro
64.227.12.46
Malicious Activity!
Public Scan
Effective URL: http://www04-auth-fidelity-session.duckdns.org/index1.php?NZhlzsPE0qyAPvweWtRltWcVw9NBTzU5lsqmxGu1LxJgwbRC3qQo4ooMmXIngZHtk5wZ8exOAIjm85ja1lLmN...
Submission: On September 16 via automatic, source openphish — Scanned from DE
Summary
This is the only time www04-auth-fidelity-session.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fidelity (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 64.227.12.46 64.227.12.46 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
4 | 45.63.85.138 45.63.85.138 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 | 2.18.232.194 2.18.232.194 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
12 | 4 |
ASN14061 (DIGITALOCEAN-ASN, US)
www04-auth-fidelity-session.duckdns.org |
ASN20473 (AS-CHOOPA, US)
PTR: 45.63.85.138.vultr.com
files.killbot.org | |
killbot.org |
ASN16625 (AKAMAI-AS, US)
PTR: a2-18-232-194.deploy.static.akamaitechnologies.com
sjc1.qualtrics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
duckdns.org
www04-auth-fidelity-session.duckdns.org |
152 KB |
4 |
killbot.org
files.killbot.org killbot.org Failed |
8 KB |
1 |
qualtrics.com
sjc1.qualtrics.com |
2 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
6 | www04-auth-fidelity-session.duckdns.org |
www04-auth-fidelity-session.duckdns.org
|
2 | killbot.org |
files.killbot.org
|
2 | files.killbot.org |
www04-auth-fidelity-session.duckdns.org
|
1 | sjc1.qualtrics.com |
www04-auth-fidelity-session.duckdns.org
|
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
files.killbot.org R3 |
2021-08-07 - 2021-11-05 |
3 months | crt.sh |
*.qualtrics.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-05-04 - 2022-02-10 |
9 months | crt.sh |
killbot.org R3 |
2021-08-08 - 2021-11-06 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www04-auth-fidelity-session.duckdns.org/index1.php?NZhlzsPE0qyAPvweWtRltWcVw9NBTzU5lsqmxGu1LxJgwbRC3qQo4ooMmXIngZHtk5wZ8exOAIjm85ja1lLmNK0SCrQ9xvFh0nS3pNNVsDTp3p2LSVRAGRpCGybh3gG7g9WGbRbcHzcnyz266hqql7
Frame ID: 7CDABE9C6C6942FB3FF75FA666A99FB0
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
FidelityPage URL History Show full URLs
- http://www04-auth-fidelity-session.duckdns.org/ Page URL
- http://www04-auth-fidelity-session.duckdns.org/index1.php?NZhlzsPE0qyAPvweWtRltWcVw9NBTzU5lsqmxGu1LxJgwbRC3qQo4ooMmXIngZHtk... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www04-auth-fidelity-session.duckdns.org/ Page URL
- http://www04-auth-fidelity-session.duckdns.org/index1.php?NZhlzsPE0qyAPvweWtRltWcVw9NBTzU5lsqmxGu1LxJgwbRC3qQo4ooMmXIngZHtk5wZ8exOAIjm85ja1lLmNK0SCrQ9xvFh0nS3pNNVsDTp3p2LSVRAGRpCGybh3gG7g9WGbRbcHzcnyz266hqql7 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www04-auth-fidelity-session.duckdns.org/ |
563 B 752 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
killbot-security.js
files.killbot.org/.cdn-cgi/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
whois
killbot.org/api/v2/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index1.php
www04-auth-fidelity-session.duckdns.org/ |
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
killbot-security.js
files.killbot.org/.cdn-cgi/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www04-auth-fidelity-session.duckdns.org/assets/ |
27 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Graphic.php
sjc1.qualtrics.com/WRQualtricsSiteIntercept/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
whois
killbot.org/api/v2/ |
265 B 1021 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
585 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FidelitySans-Regular.woff2
www04-auth-fidelity-session.duckdns.org/assets/ |
38 KB 38 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
352 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FidelitySans-Light.woff2
www04-auth-fidelity-session.duckdns.org/assets/ |
40 KB 40 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
FidelitySans-Bold.woff2
www04-auth-fidelity-session.duckdns.org/assets/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blocker
killbot.org/api/v2/ |
146 B 911 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- killbot.org
- URL
- https://killbot.org/api/v2/whois?apikey=etewm7WxokrpqKZ9R9P2e_sl-tTLNsQmhO8PG0c2WYURM
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fidelity (Banking)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster object| _0x3185 function| _0x501f function| _0x34aede0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
files.killbot.org
killbot.org
sjc1.qualtrics.com
www04-auth-fidelity-session.duckdns.org
killbot.org
2.18.232.194
45.63.85.138
64.227.12.46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