exbabylon.com
Open in
urlscan Pro
50.28.104.187
Malicious Activity!
Public Scan
Submission: On October 29 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 2nd 2021. Valid for: 3 months.
This is the only time exbabylon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
13 | 50.28.104.187 50.28.104.187 | 53824 (LIQUIDWEB) (LIQUIDWEB) | |
1 | 159.45.66.156 159.45.66.156 | 4196 (WELLSFARG...) (WELLSFARGO-4196) | |
14 | 2 |
ASN53824 (LIQUIDWEB, US)
PTR: www.exbabylon.com
exbabylon.com |
ASN4196 (WELLSFARGO-4196, US)
connect.secure.wellsfargo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
exbabylon.com
exbabylon.com |
242 KB |
1 |
wellsfargo.com
connect.secure.wellsfargo.com |
17 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
13 | exbabylon.com |
exbabylon.com
|
1 | connect.secure.wellsfargo.com |
exbabylon.com
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.voice.exbabylon.com R3 |
2021-10-02 - 2021-12-31 |
3 months | crt.sh |
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://exbabylon.com/includes/cu/createj/insidekfe/wells.htm
Frame ID: 08B7D0D7E98D5A9C7B53340279ADA60B
Requests: 14 HTTP requests in this frame
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Learn More
Search URL Search Domain Scan URL
Title: Frequently asked questions >
Search URL Search Domain Scan URL
Title: Email Security Help
Search URL Search Domain Scan URL
Title: www.wellsfargo.com/agreement
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Privacy, Security & Legal
Search URL Search Domain Scan URL
Title: Report Email Fraud
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Title: Ad Choices
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
wells.htm
exbabylon.com/includes/cu/createj/insidekfe/ |
10 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
39 KB 39 KB |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signonCommitment.css
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
6 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.css
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
8 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
144 KB 144 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wflogo-gfrewards.png
exbabylon.com/includes/cu/createj/insidekfe/wells_files/ |
20 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.2.2.js
exbabylon.com/auth/static/scripts/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
exbabylon.com/auth/static/prefs/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
47 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
search_corner.gif
exbabylon.com/includes/cu/createj/insidekfe/wells_files/images/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_blueslice.gif
exbabylon.com/includes/cu/createj/insidekfe/wells_files/images/ |
349 B 349 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargo-storefront_outdoors-street_cars-and-people-crossing_722x185.png
exbabylon.com/includes/cu/createj/images/ |
384 B 384 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)104 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler object| antiClickjack string| webId string| ndURI object| bundle function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged boolean| m object| q object| options object| lun3 boolean| isNative object| ndsapi object| nds object| js object| fjs function| nsicaakff function| ndoGetObjectKeys boolean| nstpvttmke string| ndjsStaticVersion object| nsfneyexq object| nspshl boolean| nsfneyex function| nsebch number| nspzbnebm function| nsfneye number| nstpvtt function| nstpvt object| nshksfegv function| nstpv function| nspzbnebmn object| nsicaakffx object| nshksf object| nstpvttm object| nsfne function| nshks function| ndwts object| nsebc boolean| nspsh function| nspshlqyqg function| nscpihvlo string| nspzbne string| nspzb number| numQueries object| returned function| nscpihvl string| version string| nshksfegve string| nscpi string| nsebchuf string| nsfneyexqi string| nspshlq function| nshksfe string| nsebchuff string| nscpihv object| nsebchu object| nscpih function| validateSessionIdCookie function| nsicaak function| nspshlqyq function| nspzbneb function| nsfney function| nsica function| nshksfeg function| nscpihvlox function| nsicaakf function| nsicaa function| nspshlqy function| nspzbn function| nstpvttmk function| nskmbezn function| nsjqznbu function| nsyny function| nsthcpxuxk function| ndwti function| nsletsbch function| nsthcpx function| nsoof function| nsthcpxu function| nsynybaiyf function| nsqlddrpr function| nsyin function| nsynyb function| nsqlddrp function| nsoofger function| nsqldd function| nsjqznbuh function| nsyineycfl function| nsthcp function| HashUtil function| nsqlddrpry object| nsebchuffz1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.exbabylon.com/ | Name: ndsid Value: ndsa3cdzusftsr2kvce7nm5 |
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.secure.wellsfargo.com
exbabylon.com
159.45.66.156
50.28.104.187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