login.secure.confirmation-wfbnk.xyz Open in urlscan Pro
104.131.249.228  Malicious Activity! Public Scan

URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HH...
Submission: On July 21 via automatic, source openphish

Summary

This website contacted 5 IPs in 3 countries across 5 domains to perform 9 HTTP transactions. The main IP is 104.131.249.228, located in New York, United States and belongs to DIGITALOCEAN-ASN - DigitalOcean, LLC, US. The main domain is login.secure.confirmation-wfbnk.xyz.
This is the only time login.secure.confirmation-wfbnk.xyz was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
6 104.131.249.228 14061 (DIGITALOC...)
1 2a00:1450:400... 15169 (GOOGLE)
1 94.31.29.138 54104 (AS-STACKPATH)
1 1 2400:cb00:204... 13335 (CLOUDFLAR...)
1 2400:cb00:204... 13335 (CLOUDFLAR...)
9 5
Domain Requested by
6 login.secure.confirmation-wfbnk.xyz login.secure.confirmation-wfbnk.xyz
ajax.googleapis.com
1 cdnjs.cloudflare.com login.secure.confirmation-wfbnk.xyz
1 jqueryvalidation.org 1 redirects
1 cdn.jsdelivr.net login.secure.confirmation-wfbnk.xyz
1 ajax.googleapis.com login.secure.confirmation-wfbnk.xyz
9 5

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Frame ID: EBD3D1D5CB7B0FED522B93C3D550AC29
Requests: 10 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i
  • headers server /php\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /mod_ssl(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
  • headers server /mod_ssl(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

9
Requests

0 %
HTTPS

60 %
IPv6

5
Domains

5
Subdomains

5
IPs

3
Countries

133 kB
Transfer

232 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 4
  • http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
  • https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set VerifyDetails.php
login.secure.confirmation-wfbnk.xyz/auth/
7 KB
7 KB
Document
General
Full URL
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips / PHP/5.3.3
Resource Hash
d81514cfd04da6b069c36919a0f970470c19f6c03d957c2b7e672d53f1a8d193

Request headers

Host
login.secure.confirmation-wfbnk.xyz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
EBD3D1D5CB7B0FED522B93C3D550AC29

Response headers

Date
Sat, 21 Jul 2018 07:32:04 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips
X-Powered-By
PHP/5.3.3
Set-Cookie
PHPSESSID=3bt8o3h2p7helgmn39jkn13ob5; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Length
7155
Connection
close
Content-Type
text/html; charset=UTF-8
veri.css
login.secure.confirmation-wfbnk.xyz/auth/assets/css/
45 KB
45 KB
Stylesheet
General
Full URL
http://login.secure.confirmation-wfbnk.xyz/auth/assets/css/veri.css
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips /
Resource Hash
b179f7ca80c22a676603179fa6cdd30a19465c39c39842b8fe1d0b6256082cbd

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
login.secure.confirmation-wfbnk.xyz
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Cookie
PHPSESSID=3bt8o3h2p7helgmn39jkn13ob5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 21 Jul 2018 07:32:04 GMT
Last-Modified
Tue, 02 Jan 2018 18:26:54 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips
ETag
"101203-b4a9-561cf3e3f1780"
Content-Type
text/css
Connection
close
Accept-Ranges
bytes
Content-Length
46249
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/
91 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
SPDY
Server
2a00:1450:4001:817::200a , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
sffe /
Resource Hash
61c6caebd23921741fb5ffe6603f16634fca9840c2bf56ac8201e9264d6daccf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 13 Jul 2018 12:16:22 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
674034
status
200
alt-svc
quic=":443"; ma=2592000; v="44,43,39,35"
content-length
33593
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 13 Jul 2019 12:16:22 GMT
jquery.payment.js
login.secure.confirmation-wfbnk.xyz/auth/assets/js/
17 KB
17 KB
Script
General
Full URL
http://login.secure.confirmation-wfbnk.xyz/auth/assets/js/jquery.payment.js
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips /
Resource Hash
60499c4335239d51fa6ef40bd909ba8e62a2a468b16b74f0fd9fadac1eee4bbf

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
login.secure.confirmation-wfbnk.xyz
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Cookie
PHPSESSID=3bt8o3h2p7helgmn39jkn13ob5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 21 Jul 2018 07:32:04 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:30 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips
ETag
"10127d-421b-561cf40646880"
Content-Type
text/javascript
Connection
close
Accept-Ranges
bytes
Content-Length
16923
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/
42 KB
12 KB
Script
General
Full URL
http://cdn.jsdelivr.net/jquery.validation/1.14.0/jquery.validate.js
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
HTTP/1.1
Server
94.31.29.138 , United Kingdom, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
94.31.29.138.IPYX-077437-ZYO.above.net
Software
NetDNA-cache/2.2 /
Resource Hash
ad5da6112553bd7511aea64dd18d23cef797432148142d766424c900dd919d0a
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 21 Jul 2018 07:30:16 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
NetDNA-cache/2.2
ETag
W/"a686-lD4vCzGkRPW9lmVTvUVEazM4/T0"
Transfer-Encoding
chunked
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Access-Control-Expose-Headers
*
Cache-Control
public, max-age=31536000, s-maxage=31536000, immutable
Connection
keep-alive
Timing-Allow-Origin
*
Vary
Accept-Encoding
X-Served-By
cache-ams4135-AMS, cache-fra19143-FRA
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/
Redirect Chain
  • http://jqueryvalidation.org/files/dist/additional-methods.min.js
  • https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
17 KB
5 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
SPDY
Server
2400:cb00:2048:1::6813:c597 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8b1554032d2cfbf0e858518df6460b2b4336be2cfb1f188dfd1108a3ae50b2e8
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Sat, 21 Jul 2018 07:30:16 GMT
content-encoding
gzip
vary
Accept-Encoding
cf-cache-status
HIT
status
200
served-in-seconds
0.000
last-modified
Thu, 17 May 2018 09:20:13 GMT
server
cloudflare
etag
W/"5afd494d-4587"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000; includeSubDomains
content-type
application/javascript
access-control-allow-origin
*
cache-control
public, max-age=30672000
cf-ray
43dbf612deac96be-FRA
expires
Thu, 11 Jul 2019 07:30:16 GMT

Redirect headers

Date
Sat, 21 Jul 2018 07:30:16 GMT
Server
cloudflare
Transfer-Encoding
chunked
Location
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
Cache-Control
max-age=3600
Connection
keep-alive
CF-RAY
43dbf612c6d6972c-FRA
Expires
Sat, 21 Jul 2018 08:30:16 GMT
jquery.maskedinput.js
login.secure.confirmation-wfbnk.xyz/auth/assets/js/
10 KB
10 KB
Script
General
Full URL
http://login.secure.confirmation-wfbnk.xyz/auth/assets/js/jquery.maskedinput.js
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips /
Resource Hash
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
login.secure.confirmation-wfbnk.xyz
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Cookie
PHPSESSID=3bt8o3h2p7helgmn39jkn13ob5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 21 Jul 2018 07:32:04 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:30 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips
ETag
"10127c-284d-561cf40646880"
Content-Type
text/javascript
Connection
close
Accept-Ranges
bytes
Content-Length
10317
shim.gif
login.secure.confirmation-wfbnk.xyz/auth/assets/img/
43 B
347 B
Image
General
Full URL
http://login.secure.confirmation-wfbnk.xyz/auth/assets/img/shim.gif
Requested by
Host: login.secure.confirmation-wfbnk.xyz
URL: http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
login.secure.confirmation-wfbnk.xyz
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
Cookie
PHPSESSID=3bt8o3h2p7helgmn39jkn13ob5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/VerifyDetails.php?qeqNBwYurSneyZ1NlbV5quet346MgYQHdgvONtielGsUFuH0GD667kAboGXFFOmT4SHSm06HHzCm3knJXtQ4Oqgc7eSM2fG77oZto5b6ENsI7Qr4kh98IqlPEeCGtiNAGM&securessl=true
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 21 Jul 2018 07:32:04 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:16 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips
ETag
"101254-2b-561cf3f8ec900"
Content-Type
image/gif
Connection
close
Accept-Ranges
bytes
Content-Length
43
gf.png
login.secure.confirmation-wfbnk.xyz/auth/assets/img/
2 KB
2 KB
Image
General
Full URL
http://login.secure.confirmation-wfbnk.xyz/auth/assets/img/gf.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips /
Resource Hash
1905884317b7966c4f1751ee4cb9b3b1475e09dec8ffab9e6f5cc0a007c68d36

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
login.secure.confirmation-wfbnk.xyz
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/assets/css/veri.css
Cookie
PHPSESSID=3bt8o3h2p7helgmn39jkn13ob5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://login.secure.confirmation-wfbnk.xyz/auth/assets/css/veri.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sat, 21 Jul 2018 07:32:04 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:08 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 mod_ssl/2.2.15 OpenSSL/1.0.1e-fips
ETag
"101231-870-561cf3f14b700"
Content-Type
image/png
Connection
close
Accept-Ranges
bytes
Content-Length
2160
truncated
/
270 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e2f1104899a430463d7632028c7b5cd2716148d65e7be31302449540190cce84

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery function| movetoNext

1 Cookies

Domain/Path Name / Value
login.secure.confirmation-wfbnk.xyz/ Name: PHPSESSID
Value: 3bt8o3h2p7helgmn39jkn13ob5