www.secure-bank-alerts.com Open in urlscan Pro
52.214.8.204  Malicious Activity! Public Scan

Submitted URL: https://vk39fk6q.r.eu-west-1.awstrack.me/L0/https:%2F%2Fwww.secure-bank-alerts.com%2Fsignin%3Ft=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tl...
Effective URL: https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYz...
Submission: On June 12 via manual from US

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 52.214.8.204, located in Dublin, Ireland and belongs to AMAZON-02, US. The main domain is www.secure-bank-alerts.com.
TLS certificate: Issued by Amazon on April 24th 2020. Valid for: a year.
This is the only time www.secure-bank-alerts.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Fidelity (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 52.48.68.176 16509 (AMAZON-02)
1 52.214.8.204 16509 (AMAZON-02)
1 2
Apex Domain
Subdomains
Transfer
1 secure-bank-alerts.com
www.secure-bank-alerts.com
11 KB
1 awstrack.me
vk39fk6q.r.eu-west-1.awstrack.me
674 B
1 2
Domain Requested by
1 www.secure-bank-alerts.com
1 vk39fk6q.r.eu-west-1.awstrack.me 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
secure-bank-alerts.com
Amazon
2020-04-24 -
2021-05-24
a year crt.sh

This page contains 1 frames:

Primary Page: https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiYmRkYTgwYTItNDUzYy00M2M0LWJhOTAtNmQ0YjQzZmVkMDNlIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkxOTc4NzM1LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTk3NTQ3MzV9.78OAYN22XSu-OzVcp333SZhdx2YM0y0fmtLSxpkcg0M
Frame ID: E3CF430C53375E86635CD0350F5F847A
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://vk39fk6q.r.eu-west-1.awstrack.me/L0/https:%2F%2Fwww.secure-bank-alerts.com%2Fsignin%3Ft=eyJhbGciOiJIUzI1NiJ9.... HTTP 302
    https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtND... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

11 kB
Transfer

32 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://vk39fk6q.r.eu-west-1.awstrack.me/L0/https:%2F%2Fwww.secure-bank-alerts.com%2Fsignin%3Ft=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiYmRkYTgwYTItNDUzYy00M2M0LWJhOTAtNmQ0YjQzZmVkMDNlIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkxOTc4NzM1LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTk3NTQ3MzV9.78OAYN22XSu-OzVcp333SZhdx2YM0y0fmtLSxpkcg0M/5/01020172a953b7cb-7abd4c44-fdc2-437f-b995-14cdaef92362-000000/dGzpNNBGs7z9sTtZBMuLceS6Kqs=166 HTTP 302
    https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiYmRkYTgwYTItNDUzYy00M2M0LWJhOTAtNmQ0YjQzZmVkMDNlIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkxOTc4NzM1LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTk3NTQ3MzV9.78OAYN22XSu-OzVcp333SZhdx2YM0y0fmtLSxpkcg0M Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin
www.secure-bank-alerts.com/
Redirect Chain
  • https://vk39fk6q.r.eu-west-1.awstrack.me/L0/https:%2F%2Fwww.secure-bank-alerts.com%2Fsignin%3Ft=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNl...
  • https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMt...
27 KB
11 KB
Document
General
Full URL
https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiYmRkYTgwYTItNDUzYy00M2M0LWJhOTAtNmQ0YjQzZmVkMDNlIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkxOTc4NzM1LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTk3NTQ3MzV9.78OAYN22XSu-OzVcp333SZhdx2YM0y0fmtLSxpkcg0M
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.214.8.204 Dublin, Ireland, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-52-214-8-204.eu-west-1.compute.amazonaws.com
Software
nginx/1.16.1 /
Resource Hash
482fd13b75adf98583a47f7177bd4511790e1b501a07722031587960cf1a575c

Request headers

Host
www.secure-bank-alerts.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 12 Jun 2020 17:33:44 GMT
Content-Type
text/html; charset=utf-8
Content-Length
10816
Connection
keep-alive
Server
nginx/1.16.1
Content-Encoding
gzip
X-rq
lhr2 102 123 3143
Cache-Control
max-age=300, must-revalidate
Age
1294
X-Cache
hit
Vary
Accept-Encoding
Accept-Ranges
bytes

Redirect headers

Date
Fri, 12 Jun 2020 17:33:44 GMT
Location
https://www.secure-bank-alerts.com/signin?t=eyJhbGciOiJIUzI1NiJ9.eyJ0cmFja2luZ190b2tlbiI6ImU5MDM5YmQyLWY5MDQtNDliMC04NjE5LTE5ZDhlYzcyYzYxZCIsImNlbGwiOiJodHRwczovLzIxZzZqZnZoeTYuZXhlY3V0ZS1hcGkudXMtZWFzdC0yLmFtYXpvbmF3cy5jb20vcHJvZC9hcGkvcGhpc2hpbmdjYW1wYWlnbiIsImNhbXBhaWduX3Rva2VuIjoiYmRkYTgwYTItNDUzYy00M2M0LWJhOTAtNmQ0YjQzZmVkMDNlIiwidGVzdF90b2tlbiI6ZmFsc2UsImV4dGVybmFsX3RyYWluaW5nIjpmYWxzZSwiaWF0IjoxNTkxOTc4NzM1LCJpc3MiOiJodHRwczovL2FwcC5waGlzaHRocmVhdC5jb20iLCJleHAiOjE1OTk3NTQ3MzV9.78OAYN22XSu-OzVcp333SZhdx2YM0y0fmtLSxpkcg0M
Server
Apache-Coyote/1.1
Content-Length
0
Connection
keep-alive
truncated
/
90 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
db1a93fdbe73a47896e343a3238c85fdc0c369a3cc2b49fdf3262292ef550fb2

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2a1c09732cb11b016693c838b9797d112b5969e8207c79c23c8d39f00eb6a2f0

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fb28109f5999c6e2da2b506f4882d91c1714949f00057d650625501a33c87b44

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Fidelity (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies