104.131.249.228 Open in urlscan Pro
104.131.249.228  Malicious Activity! Public Scan

URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGf...
Submission: On June 15 via automatic, source openphish

Summary

This website contacted 6 IPs in 1 countries across 5 domains to perform 10 HTTP transactions. The main IP is 104.131.249.228, located in New York, United States and belongs to DIGITALOCEAN-ASN - DigitalOcean, LLC, US. The main domain is 104.131.249.228.
This is the only time 104.131.249.228 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
6 104.131.249.228 14061 (DIGITALOC...)
1 216.58.214.106 15169 (GOOGLE)
1 104.16.87.20 13335 (CLOUDFLAR...)
1 1 104.28.21.119 13335 (CLOUDFLAR...)
1 104.19.197.151 13335 (CLOUDFLAR...)
1 159.45.2.180 10837 (WELLSFARG...)
10 6
Domain Requested by
1 oam.wellsfargo.com 104.131.249.228
1 cdnjs.cloudflare.com 104.131.249.228
1 jqueryvalidation.org 1 redirects
1 cdn.jsdelivr.net 104.131.249.228
1 ajax.googleapis.com 104.131.249.228
10 5

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Frame ID: CE8673E95C6B4859B29613E86FAD580F
Requests: 11 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i
  • headers server /php\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

10
Requests

0 %
HTTPS

0 %
IPv6

5
Domains

5
Subdomains

6
IPs

1
Countries

159 kB
Transfer

258 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 4
  • http://jqueryvalidation.org/files/dist/additional-methods.min.js HTTP 301
  • https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request VerifyCard.php
104.131.249.228/auth/unlock/
6 KB
6 KB
Document
General
Full URL
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 / PHP/5.3.3
Resource Hash
d25d7c3694f603ab6317ddc35d8def5c53ee92c30462b53536a48875b546e6be

Request headers

Host
104.131.249.228
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
CE8673E95C6B4859B29613E86FAD580F

Response headers

Date
Fri, 15 Jun 2018 22:16:42 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3
X-Powered-By
PHP/5.3.3
Content-Length
6244
Connection
close
Content-Type
text/html; charset=UTF-8
veri.css
104.131.249.228/auth/unlock/assets/css/
45 KB
45 KB
Stylesheet
General
Full URL
http://104.131.249.228/auth/unlock/assets/css/veri.css
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 /
Resource Hash
b179f7ca80c22a676603179fa6cdd30a19465c39c39842b8fe1d0b6256082cbd

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
104.131.249.228
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:16:42 GMT
Last-Modified
Tue, 02 Jan 2018 18:26:54 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3
ETag
"1011fb-b4a9-561cf3e3f1780"
Content-Type
text/css
Connection
close
Accept-Ranges
bytes
Content-Length
46249
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.8.3/
91 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
SPDY
Server
216.58.214.106 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s05-in-f106.1e100.net
Software
sffe /
Resource Hash
61c6caebd23921741fb5ffe6603f16634fca9840c2bf56ac8201e9264d6daccf
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Mon, 12 Feb 2018 20:57:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
10631881
status
200
alt-svc
quic=":443"; ma=2592000; v="43,42,41,39,35"
content-length
33593
x-xss-protection
1; mode=block
last-modified
Tue, 20 Dec 2016 18:17:03 GMT
server
sffe
vary
Accept-Encoding
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Tue, 12 Feb 2019 20:57:31 GMT
jquery.payment.js
104.131.249.228/auth/unlock/assets/js/
17 KB
17 KB
Script
General
Full URL
http://104.131.249.228/auth/unlock/assets/js/jquery.payment.js
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 /
Resource Hash
60499c4335239d51fa6ef40bd909ba8e62a2a468b16b74f0fd9fadac1eee4bbf

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
104.131.249.228
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:16:42 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:30 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3
ETag
"101275-421b-561cf40646880"
Content-Type
text/javascript
Connection
close
Accept-Ranges
bytes
Content-Length
16923
jquery.validate.js
cdn.jsdelivr.net/jquery.validation/1.14.0/
42 KB
12 KB
Script
General
Full URL
http://cdn.jsdelivr.net/jquery.validation/1.14.0/jquery.validate.js
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
104.16.87.20 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
ad5da6112553bd7511aea64dd18d23cef797432148142d766424c900dd919d0a

Request headers

Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:15:32 GMT
Content-Encoding
gzip
CF-Cache-Status
HIT
CF-RAY
42b8655c139c649f-FRA
X-Cache
HIT, HIT
Connection
keep-alive
Content-Length
11438
X-Served-By
cache-ams4133-AMS, cache-hhn1535-HHN
Server
cloudflare
ETag
"a686-lD4vCzGkRPW9lmVTvUVEazM4/T0"
Vary
Accept-Encoding
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=31536000, s-maxage=31536000
Accept-Ranges
bytes
Timing-Allow-Origin
*
additional-methods.min.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/
Redirect Chain
  • http://jqueryvalidation.org/files/dist/additional-methods.min.js
  • https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
17 KB
5 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
SPDY
Server
104.19.197.151 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
8b1554032d2cfbf0e858518df6460b2b4336be2cfb1f188dfd1108a3ae50b2e8
Security Headers
Name Value
Strict-Transport-Security max-age=15780000; includeSubDomains

Request headers

Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

date
Fri, 15 Jun 2018 22:15:32 GMT
content-encoding
gzip
cf-cache-status
HIT
last-modified
Tue, 06 Dec 2016 20:16:41 GMT
server
cloudflare
status
200
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
strict-transport-security
max-age=15780000; includeSubDomains
cf-ray
42b8655c3b199726-FRA
expires
Wed, 05 Jun 2019 22:15:32 GMT

Redirect headers

Date
Fri, 15 Jun 2018 22:15:32 GMT
Server
cloudflare
Transfer-Encoding
chunked
Location
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.16.0/additional-methods.min.js
Cache-Control
max-age=3600
Connection
keep-alive
CF-RAY
42b8655c17fb644b-FRA
Expires
Fri, 15 Jun 2018 23:15:32 GMT
jquery.maskedinput.js
104.131.249.228/auth/unlock/assets/js/
10 KB
10 KB
Script
General
Full URL
http://104.131.249.228/auth/unlock/assets/js/jquery.maskedinput.js
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 /
Resource Hash
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
104.131.249.228
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:16:42 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:30 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3
ETag
"101274-284d-561cf40646880"
Content-Type
text/javascript
Connection
close
Accept-Ranges
bytes
Content-Length
10317
cardcheck.js
104.131.249.228/auth/unlock/assets/js/
28 KB
28 KB
Script
General
Full URL
http://104.131.249.228/auth/unlock/assets/js/cardcheck.js
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 /
Resource Hash
6ccf4fd58cfc81f14bc1cb330bd9f0bce4e6f16e829380c0e39033d48b8c5719

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
104.131.249.228
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Connection
keep-alive
Cache-Control
no-cache
Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:16:42 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:28 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3
ETag
"101271-6e57-561cf4045e400"
Content-Type
text/javascript
Connection
close
Accept-Ranges
bytes
Content-Length
28247
shim.gif
oam.wellsfargo.com/oam/static/images/
43 B
505 B
Image
General
Full URL
https://oam.wellsfargo.com/oam/static/images/shim.gif
Requested by
Host: 104.131.249.228
URL: http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
Protocol
HTTP/1.1
Server
159.45.2.180 , United States, ASN10837 (WELLSFARGO-10837 - Wells Fargo & Company, US),
Reverse DNS
Software
KONICHIWA/1.1 /
Resource Hash
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://104.131.249.228/auth/unlock/VerifyCard.php?y47fUOCqG5ytBbU08O2ziFzrNvvPfwYOB63vUFWALu4mGZnOOpn64XyRs3HHAFvbLzHGfDh08lmOkJD891fdYN5qRM8ssEDedlVsZcs8yPXSzA1IBgWz420WO9ohN2v1nq&securessl=true
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:15:32 GMT
X-Content-Type-Options
nosniff
Last-Modified
Thu, 12 Apr 2018 15:29:36 GMT
Server
KONICHIWA/1.1
X-Frame-Options
SAMEORIGIN
ETag
"5acf7b60-2b"
Strict-Transport-Security
max-age=31536000; includeSubdomains;
Content-Type
image/gif
Cache-Control
no-cache
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
43
X-XSS-Protection
1; mode=block
Expires
Thu, 14 Jun 2018 22:15:32 GMT
gf.png
104.131.249.228/auth/unlock/assets/img/
2 KB
2 KB
Image
General
Full URL
http://104.131.249.228/auth/unlock/assets/img/gf.png
Requested by
Host: ajax.googleapis.com
URL: https://ajax.googleapis.com/ajax/libs/jquery/1.8.3/jquery.min.js
Protocol
HTTP/1.1
Server
104.131.249.228 New York, United States, ASN14061 (DIGITALOCEAN-ASN - DigitalOcean, LLC, US),
Reverse DNS
server.dmxwebsolutions.com.br
Software
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3 /
Resource Hash
1905884317b7966c4f1751ee4cb9b3b1475e09dec8ffab9e6f5cc0a007c68d36

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
104.131.249.228
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://104.131.249.228/auth/unlock/assets/css/veri.css
Connection
keep-alive
Cache-Control
no-cache
Referer
http://104.131.249.228/auth/unlock/assets/css/veri.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Fri, 15 Jun 2018 22:16:43 GMT
Last-Modified
Tue, 02 Jan 2018 18:27:08 GMT
Server
Apache/2.2.15 (CentOS) DAV/2 PHP/5.3.3
ETag
"101229-870-561cf3f14b700"
Content-Type
image/png
Connection
close
Accept-Ranges
bytes
Content-Length
2160
truncated
/
270 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e2f1104899a430463d7632028c7b5cd2716148d65e7be31302449540190cce84

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery function| CardCheck function| movetoNext

0 Cookies