app.boostsurfing.com Open in urlscan Pro
2606:4700:20::ac43:4562  Malicious Activity! Public Scan

URL: https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Submission: On September 17 via automatic, source openphish — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 2606:4700:20::ac43:4562, located in United States and belongs to CLOUDFLARENET, US. The main domain is app.boostsurfing.com.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on April 23rd 2022. Valid for: a year.
This is the only time app.boostsurfing.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
3 2606:4700:20:... 13335 (CLOUDFLAR...)
3 2
Apex Domain
Subdomains
Transfer
3 boostsurfing.com
app.boostsurfing.com
39 KB
3 1
Domain Requested by
3 app.boostsurfing.com app.boostsurfing.com
3 1

This site contains links to these domains. Also see Links.

Domain
www.wellsfargo.com
Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-04-23 -
2023-04-23
a year crt.sh

This page contains 1 frames:

Primary Page: https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Frame ID: 1123BCC68C26FDE291462E832CE43954
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

Wells Fargo Sign On to View Your Accounts

Detected technologies

Overall confidence: 100%
Detected patterns
  • <[^>]+data-react

Page Statistics

3
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

39 kB
Transfer

88 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
36 KB
0
Document
General
Full URL
https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:4562 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
74be6d09bfbf9b37-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Sat, 17 Sep 2022 02:31:29 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=sqUNyr8VVPkdrquFKRPhvGLuSnKRi0wVCWtokUDoQD8Lwjbsc0xGQbwQbaZi3PCuwAeJ0PKob5m%2BsuDI73o0qb4jUNyNIzOJwFeR83M33hwij%2FoV64j8jFMwKglfEIIrVMCPnHGhI938R6PW68uVqtAe"}],"group":"cf-nel","max_age":604800}
server
cloudflare
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
a
app.boostsurfing.com/wells/jriodm=/we3ogu=/css%20js/
471 B
847 B
Script
General
Full URL
https://app.boostsurfing.com/wells/jriodm=/we3ogu=/css%20js/a
Requested by
Host: app.boostsurfing.com
URL: https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:4562 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c5bbf24cf64a90ae2d6c90f4bc1571626d09b4c5d6e0af0badd1d2e72ae49cfb
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

date
Sat, 17 Sep 2022 02:31:30 GMT
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
last-modified
Fri, 16 Sep 2022 21:15:08 GMT
server
cloudflare
etag
"6324e75c-1d7"
x-frame-options
SAMEORIGIN
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=yrZlSc%2Bf6PWQ4%2BpmgNLdR6SFhYhcGMcR8NjDOF57rSD9N9lOWG%2BbVv4%2BEWNxVRY3MG1QejnYRSCjtKDl6GxXKO9%2FsmGtqlqSjAVISChwLW%2FWIWvwxvAQPYWOYru6JYqYWwUDciZR4vqG0sxh73AUgUcl"}],"group":"cf-nel","max_age":604800}
content-type
application/octet-stream
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
accept-ranges
bytes
cf-ray
74be6d0bc9089b37-FRA
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
471
x-xss-protection
1; mode=block
nd
app.boostsurfing.com/wells/jriodm=/we3ogu=/css%20js/
37 KB
38 KB
Script
General
Full URL
https://app.boostsurfing.com/wells/jriodm=/we3ogu=/css%20js/nd
Requested by
Host: app.boostsurfing.com
URL: https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:4562 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
23a1000b5986d9613a9089ad8bde53bb675e0555ecbddffd81bd6c0781112c35
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

date
Sat, 17 Sep 2022 02:31:30 GMT
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
last-modified
Fri, 16 Sep 2022 21:15:08 GMT
server
cloudflare
etag
"6324e75c-95fc"
x-frame-options
SAMEORIGIN
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=6hudnUHffC%2FphOIZqAH%2BWXDY%2BKHVynFkBSnpvLonOr8c9DwKXkh119QwM2U1atqIVmPkCp9rIWFO%2Bo3QnGFUBDRa2mV7QcfTmQgVlsCJAKwhWlHZ1Tq6O%2FZX6t%2FxY7qOlPJD4bJlpSPesUJugDqA7Xjx"}],"group":"cf-nel","max_age":604800}
content-type
application/octet-stream
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
accept-ranges
bytes
cf-ray
74be6d0bd9099b37-FRA
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
38396
x-xss-protection
1; mode=block
truncated
/
12 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f809fa596dc2e66029e195d0aef2d6d7b077ea1f7d145455441ba893875aec41

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
17f3818bba16137fba7657230309043ae41cd08a5df25a7c61cd9583291c1354

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/105.0.5195.125 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

12 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| antiClickjack string| webId string| ndURI

0 Cookies

2 Console Messages

Source Level URL
Text
security error URL: https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Message:
Refused to execute script from 'https://app.boostsurfing.com/wells/jriodm=/we3ogu=/css%20js/a' because its MIME type ('application/octet-stream') is not executable, and strict MIME type checking is enabled.
security error URL: https://app.boostsurfing.com/wells/jriodm=/we3ogu=/2m1mgy=/
Message:
Refused to execute script from 'https://app.boostsurfing.com/wells/jriodm=/we3ogu=/css%20js/nd' because its MIME type ('application/octet-stream') is not executable, and strict MIME type checking is enabled.

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block