ns2.ourletter.com.br
Open in
urlscan Pro
104.131.249.228
Malicious Activity!
Public Scan
Submission: On July 16 via automatic, source openphish
Summary
This is the only time ns2.ourletter.com.br was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 104.131.249.228 104.131.249.228 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN - DigitalOcean) | |
1 | 2a00:1450:400... 2a00:1450:4001:817::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 104.16.86.20 104.16.86.20 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 1 | 2400:cb00:204... 2400:cb00:2048:1::681c:1577 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2400:cb00:204... 2400:cb00:2048:1::6813:c497 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
9 | 5 |
ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US)
PTR: server.dmxwebsolutions.com.br
ns2.ourletter.com.br |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn.jsdelivr.net |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
jqueryvalidation.org |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ourletter.com.br
ns2.ourletter.com.br |
83 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
5 KB |
1 |
jqueryvalidation.org
1 redirects
jqueryvalidation.org |
341 B |
1 |
jsdelivr.net
cdn.jsdelivr.net |
12 KB |
1 |
googleapis.com
ajax.googleapis.com |
33 KB |
9 | 5 |
Domain | Requested by | |
---|---|---|
6 | ns2.ourletter.com.br |
ns2.ourletter.com.br
ajax.googleapis.com |
1 | cdnjs.cloudflare.com |
ns2.ourletter.com.br
|
1 | jqueryvalidation.org | 1 redirects |
1 | cdn.jsdelivr.net |
ns2.ourletter.com.br
|
1 | ajax.googleapis.com |
ns2.ourletter.com.br
|
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://ns2.ourletter.com.br/secure/login/VerifyDetails.php?3Lgz0pm258ZA0TYBe8fVLWM1nl6P6sTad9Jey6gEegeeadPpl5k7269psffzH8JVit9RzqvOHJ2RXSgiYAp0HypaOEKvNur5XBWx1slIcoA9gQsfrSf9rEjfj3L6yccvN9&securessl=true
Frame ID: ADDE6152373CFDA702234EDDF9F62AB2
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
- headers server /php\/?([\d.]+)?/i
CentOS (Operating Systems) Expand
Detected patterns
- headers server /CentOS/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
- https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
VerifyDetails.php
ns2.ourletter.com.br/secure/login/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
veri.css
ns2.ourletter.com.br/secure/login/assets/css/ |
45 KB 45 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/ |
91 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
ns2.ourletter.com.br/secure/login/assets/js/ |
17 KB 17 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/ |
42 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/ Redirect Chain
|
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.js
ns2.ourletter.com.br/secure/login/assets/js/ |
10 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
ns2.ourletter.com.br/secure/login/assets/img/ |
43 B 347 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gf.png
ns2.ourletter.com.br/secure/login/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| movetoNext1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ns2.ourletter.com.br/ | Name: PHPSESSID Value: qkakct31diraf8m0l10sr07gf0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
jqueryvalidation.org
ns2.ourletter.com.br
104.131.249.228
104.16.86.20
2400:cb00:2048:1::6813:c497
2400:cb00:2048:1::681c:1577
2a00:1450:4001:817::200a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