![](/screenshots/795a5431-66ea-4399-9016-662e7157f126.png)
citibank-onlinebank.herokuapp.com
Open in
urlscan Pro
52.5.6.26
Malicious Activity!
Public Scan
Submission: On March 26 via manual from US
Summary
This is the only time citibank-onlinebank.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.5.6.26 52.5.6.26 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 192.64.118.79 192.64.118.79 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
2 | 3 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-5-6-26.compute-1.amazonaws.com
citibank-onlinebank.herokuapp.com |
ASN22612 (NAMECHEAP-NET, US)
PTR: server82-5.web-hosting.com
kjtradings.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
kjtradings.com
kjtradings.com |
37 KB |
1 |
herokuapp.com
citibank-onlinebank.herokuapp.com |
31 KB |
2 | 2 |
Domain | Requested by | |
---|---|---|
1 | kjtradings.com |
citibank-onlinebank.herokuapp.com
|
1 | citibank-onlinebank.herokuapp.com | |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
kjtradings.com Sectigo RSA Domain Validation Secure Server CA |
2020-06-15 - 2021-06-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://citibank-onlinebank.herokuapp.com/
Frame ID: 0E15E4DBA9F84EFC496E0B2FD1F0294C
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
citibank-onlinebank.herokuapp.com/ |
30 KB 31 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
citiii.png
kjtradings.com/online/ |
36 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| callform0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
citibank-onlinebank.herokuapp.com
kjtradings.com
192.64.118.79
52.5.6.26
1ed889a15705bc76729d29d715c64f3d7f35de2ea519e1d2704924cf40d9e30d
a91b46efe5bd65342e8e165325a947097a4de51672b74a8075e27c191f99e844
e4688427398b18e24b3f6005f1a776a762cca781168ad2f272b5838ac7303c45