citibank-onlinebank.herokuapp.com Open in urlscan Pro
52.5.6.26  Malicious Activity! Public Scan

URL: http://citibank-onlinebank.herokuapp.com/
Submission: On March 26 via manual from US

Summary

This website contacted 3 IPs in 1 countries across 2 domains to perform 2 HTTP transactions. The main IP is 52.5.6.26, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is citibank-onlinebank.herokuapp.com.
This is the only time citibank-onlinebank.herokuapp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
1 52.5.6.26 14618 (AMAZON-AES)
1 192.64.118.79 22612 (NAMECHEAP...)
2 3
Apex Domain
Subdomains
Transfer
1 kjtradings.com
kjtradings.com
37 KB
1 herokuapp.com
citibank-onlinebank.herokuapp.com
31 KB
2 2
Domain Requested by
1 kjtradings.com citibank-onlinebank.herokuapp.com
1 citibank-onlinebank.herokuapp.com
2 2

This site contains no links.

Subject Issuer Validity Valid
kjtradings.com
Sectigo RSA Domain Validation Secure Server CA
2020-06-15 -
2021-06-15
a year crt.sh

This page contains 1 frames:

Primary Page: http://citibank-onlinebank.herokuapp.com/
Frame ID: 0E15E4DBA9F84EFC496E0B2FD1F0294C
Requests: 3 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Page Statistics

2
Requests

50 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

1
Countries

67 kB
Transfer

68 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
citibank-onlinebank.herokuapp.com/
30 KB
31 KB
Document
General
Full URL
http://citibank-onlinebank.herokuapp.com/
Protocol
HTTP/1.1
Server
52.5.6.26 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-5-6-26.compute-1.amazonaws.com
Software
Cowboy / Express
Resource Hash
a91b46efe5bd65342e8e165325a947097a4de51672b74a8075e27c191f99e844

Request headers

Host
citibank-onlinebank.herokuapp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Server
Cowboy
Connection
keep-alive
X-Powered-By
Express
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
Content-Type
text/html; charset=utf-8
Content-Length
30971
Etag
W/"78fb-v/8fcQB1VSVD1+OUy4UZisyEbnU"
Date
Fri, 26 Mar 2021 17:38:05 GMT
Via
1.1 vegur
citiii.png
kjtradings.com/online/
36 KB
37 KB
Image
General
Full URL
https://kjtradings.com/online/citiii.png
Requested by
Host: citibank-onlinebank.herokuapp.com
URL: http://citibank-onlinebank.herokuapp.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.64.118.79 , United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server82-5.web-hosting.com
Software
Apache /
Resource Hash
e4688427398b18e24b3f6005f1a776a762cca781168ad2f272b5838ac7303c45

Request headers

Referer
http://citibank-onlinebank.herokuapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 26 Mar 2021 17:38:05 GMT
last-modified
Thu, 18 Mar 2021 21:20:44 GMT
server
Apache
accept-ranges
bytes
content-length
37283
content-type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1ed889a15705bc76729d29d715c64f3d7f35de2ea519e1d2704924cf40d9e30d

Request headers

Referer
http://citibank-onlinebank.herokuapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| callform

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

citibank-onlinebank.herokuapp.com
kjtradings.com
192.64.118.79
52.5.6.26
1ed889a15705bc76729d29d715c64f3d7f35de2ea519e1d2704924cf40d9e30d
a91b46efe5bd65342e8e165325a947097a4de51672b74a8075e27c191f99e844
e4688427398b18e24b3f6005f1a776a762cca781168ad2f272b5838ac7303c45