URL: http://alert-fraud-detected-wellsfargo0.tk:8080/
Submission: On August 14 via api from QA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 91.92.136.100, located in Cyprus and belongs to BELCLOUD, BG. The main domain is alert-fraud-detected-wellsfargo0.tk.
This is the only time alert-fraud-detected-wellsfargo0.tk was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 91.92.136.100 44901 (BELCLOUD)
3 1
Domain Requested by
3 alert-fraud-detected-wellsfargo0.tk alert-fraud-detected-wellsfargo0.tk
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://alert-fraud-detected-wellsfargo0.tk:8080/
Frame ID: 43EE88B636D51F3D7069AEDED94E6B9A
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

2 kB
Transfer

1 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
alert-fraud-detected-wellsfargo0.tk/
769 B
676 B
Document
General
Full URL
http://alert-fraud-detected-wellsfargo0.tk:8080/
Protocol
HTTP/1.1
Server
91.92.136.100 , Cyprus, ASN44901 (BELCLOUD, BG),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
683fd53beabce45d4e058a95397a3854d48495686652d08662b4cab45389be9d

Request headers

Host
alert-fraud-detected-wellsfargo0.tk:8080
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 14 Aug 2020 01:02:23 GMT
Server
Apache/2.4.18 (Ubuntu)
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
425
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html;charset=UTF-8
blank.gif
alert-fraud-detected-wellsfargo0.tk/icons/
148 B
431 B
Image
General
Full URL
http://alert-fraud-detected-wellsfargo0.tk:8080/icons/blank.gif
Requested by
Host: alert-fraud-detected-wellsfargo0.tk
URL: http://alert-fraud-detected-wellsfargo0.tk:8080/
Protocol
HTTP/1.1
Server
91.92.136.100 , Cyprus, ASN44901 (BELCLOUD, BG),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
3cb0e54babf019703fe671a32fcc3947aab9079ec2871cf0f9639245cc12d878

Request headers

Referer
http://alert-fraud-detected-wellsfargo0.tk:8080/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 14 Aug 2020 01:02:23 GMT
Last-Modified
Sat, 20 Nov 2004 20:16:24 GMT
Server
Apache/2.4.18 (Ubuntu)
ETag
"94-3e9564c23b600"
Content-Type
image/gif
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
148
folder.gif
alert-fraud-detected-wellsfargo0.tk/icons/
225 B
509 B
Image
General
Full URL
http://alert-fraud-detected-wellsfargo0.tk:8080/icons/folder.gif
Requested by
Host: alert-fraud-detected-wellsfargo0.tk
URL: http://alert-fraud-detected-wellsfargo0.tk:8080/
Protocol
HTTP/1.1
Server
91.92.136.100 , Cyprus, ASN44901 (BELCLOUD, BG),
Reverse DNS
Software
Apache/2.4.18 (Ubuntu) /
Resource Hash
fbe5eca717cfbcb58891d431f9afaf30aa740d9fce007e820a599f22afa0dee2

Request headers

Referer
http://alert-fraud-detected-wellsfargo0.tk:8080/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 14 Aug 2020 01:02:23 GMT
Last-Modified
Sat, 20 Nov 2004 20:16:24 GMT
Server
Apache/2.4.18 (Ubuntu)
ETag
"e1-3e9564c23b600"
Content-Type
image/gif
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
225

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

alert-fraud-detected-wellsfargo0.tk
91.92.136.100
3cb0e54babf019703fe671a32fcc3947aab9079ec2871cf0f9639245cc12d878
683fd53beabce45d4e058a95397a3854d48495686652d08662b4cab45389be9d
fbe5eca717cfbcb58891d431f9afaf30aa740d9fce007e820a599f22afa0dee2