exbabylon.com
Open in
urlscan Pro
50.28.104.187
Malicious Activity!
Public Scan
Effective URL: https://exbabylon.com/includes/cu/createj/insidekfe/wells.htm
Submission: On November 01 via api from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 2nd 2021. Valid for: 3 months.
This is the only time exbabylon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 15 | 50.28.104.187 50.28.104.187 | 53824 (LIQUIDWEB) (LIQUIDWEB) | |
1 | 159.45.66.156 159.45.66.156 | 4196 (WELLSFARG...) (WELLSFARGO-4196) | |
15 | 2 |
ASN53824 (LIQUIDWEB, US)
PTR: www.exbabylon.com
www.exbabylon.com | |
exbabylon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
exbabylon.com
1 redirects
www.exbabylon.com exbabylon.com |
242 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
17 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
14 | exbabylon.com |
exbabylon.com
|
1 | connect.secure.wellsfargo.com |
exbabylon.com
|
1 | www.exbabylon.com | 1 redirects |
15 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.voice.exbabylon.com R3 |
2021-10-02 - 2021-12-31 |
3 months | crt.sh |
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://exbabylon.com/includes/cu/createj/insidekfe/wells.htm
Frame ID: 9D1008B85B2F842116C5F6D8E6B4C711
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Wells Fargo Sign On to View Your AccountsPage URL History Show full URLs
-
http://www.exbabylon.com/includes/cu/createj/insidekfe/wells.htm
HTTP 301
https://exbabylon.com/includes/cu/createj/insidekfe/wells.htm Page URL
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Learn More
Search URL Search Domain Scan URL
Title: Frequently asked questions >
Search URL Search Domain Scan URL
Title: Email Security Help
Search URL Search Domain Scan URL
Title: www.wellsfargo.com/agreement
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.exbabylon.com/includes/cu/createj/insidekfe/wells.htm
HTTP 301
https://exbabylon.com/includes/cu/createj/insidekfe/wells.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
wells.htm
exbabylon.com/includes/cu/createj/insidekfe/ Redirect Chain
|
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signonCommitment.css
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
8 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
144 KB 144 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wflogo-gfrewards.png
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.2.2.js
exbabylon.com/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
exbabylon.com/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
exbabylon.com/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search_corner.gif
exbabylon.com/includes/cu/createj/insidekfe/wells_files/images/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
exbabylon.com/includes/cu/createj/insidekfe/wells_files/images/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
exbabylon.com/includes/cu/createj/images/ |
384 B 384 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)110 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| antiClickjack string| webId string| ndURI object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged boolean| m object| q object| options object| lun3 boolean| isNative object| ndsapi object| nds object| js object| fjs function| ndoGetObjectKeys boolean| nstagvc function| HashUtil string| ndjsStaticVersion object| nstagvcmvd function| nsoowqia function| nsduywze function| nsdbqqsm object| nsbsvop boolean| nsgepmr number| nsduywz number| nsbsvopv function| ndwti object| nstag object| nssuppzrgb object| nsbsvopvr function| nsmuwnbgfv object| nsbsvo function| nsgepmrgh object| nsbsvopvrk object| nsoowqiag boolean| nstagvcm function| nsdbqqsmw function| nsoowqi function| nsmuwn function| nsdbq function| nssupp function| nsgepmrg function| nsoowqiagn string| nsgepmrghs string| nssuppzr number| numQueries object| returned string| version string| nstagvcmv function| nssuppzrg string| nsoow string| nsmuw string| nsbsv string| nsgepm function| nsduy string| nsduyw string| nsdbqqsmwu object| nssup function| nssuppz function| nsmuwnbgf object| nsduywzes function| nstagv function| nsmuwnb function| nsgep function| nsdbqqs function| nsdbqq function| nsduywzest function| nsmuwnbg function| nsmhh function| nsyygcpda function| nsyyg function| nsyunvnz function| nsmhhlc function| nstonqjxfa function| nshdgw function| nshdg function| nsvfmtn function| nsvfmt function| nsyun function| nsvletmw function| ndwts function| nsmhhlcetc function| nsyygcp function| nsyygc function| nsyunvnzsu function| nsvletm function| nsprorugw function| nsyunv function| nsvfmtnp function| nsvle function| nshdgwy object| nsoowq function| nstonqj function| nsmhhlce function| validateSessionIdCookie function| nsyunvn1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.exbabylon.com/ | Name: ndsid Value: ndsao5y97503bhkvgxdztz |
7 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
exbabylon.com
www.exbabylon.com
159.45.66.156
50.28.104.187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