noodleking.com.tr
Open in
urlscan Pro
95.173.177.114
Malicious Activity!
Public Scan
Submission: On March 22 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 28th 2023. Valid for: 3 months.
This is the only time noodleking.com.tr was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 95.173.177.114 95.173.177.114 | 51559 (NETINTERN...) (NETINTERNET Netinternet Bilisim Teknolojileri AS) | |
12 | 23.200.55.18 23.200.55.18 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 23.200.55.23 23.200.55.23 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 23.2.142.77 23.2.142.77 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
3 | 23.2.132.13 23.2.132.13 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 65.9.42.33 65.9.42.33 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 54.71.98.196 54.71.98.196 | 16509 (AMAZON-02) (AMAZON-02) | |
24 | 9 |
ASN51559 (NETINTERNET Netinternet Bilisim Teknolojileri AS, TR)
PTR: boss.hozzt.com
noodleking.com.tr |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-200-55-18.deploy.static.akamaitechnologies.com
connect.secure.wellsfargo.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-200-55-23.deploy.static.akamaitechnologies.com
static.wellsfargo.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-2-142-77.deploy.static.akamaitechnologies.com
www10.wellsfargomedia.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-2-132-13.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
ASN16509 (AMAZON-02, US)
PTR: server-65-9-42-33.nrt12.r.cloudfront.net
cdn.appdynamics.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-71-98-196.us-west-2.compute.amazonaws.com
col.eum-appdynamics.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
wellsfargo.com
connect.secure.wellsfargo.com — Cisco Umbrella Rank: 13540 static.wellsfargo.com — Cisco Umbrella Rank: 12514 |
818 KB |
4 |
wellsfargomedia.com
www10.wellsfargomedia.com — Cisco Umbrella Rank: 17291 www15.wellsfargomedia.com — Cisco Umbrella Rank: 25683 |
716 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 194 |
25 KB |
2 |
noodleking.com.tr
noodleking.com.tr |
10 KB |
1 |
eum-appdynamics.com
col.eum-appdynamics.com — Cisco Umbrella Rank: 2790 |
734 B |
1 |
appdynamics.com
cdn.appdynamics.com — Cisco Umbrella Rank: 3482 |
19 KB |
24 | 6 |
Domain | Requested by | |
---|---|---|
12 | connect.secure.wellsfargo.com |
noodleking.com.tr
connect.secure.wellsfargo.com |
3 | www15.wellsfargomedia.com |
connect.secure.wellsfargo.com
|
2 | static.wellsfargo.com |
noodleking.com.tr
|
2 | cdnjs.cloudflare.com |
noodleking.com.tr
cdnjs.cloudflare.com |
2 | noodleking.com.tr |
noodleking.com.tr
|
1 | col.eum-appdynamics.com |
cdn.appdynamics.com
|
1 | cdn.appdynamics.com |
static.wellsfargo.com
|
1 | www10.wellsfargomedia.com |
noodleking.com.tr
|
24 | 8 |
This site contains links to these domains. Also see Links.
Domain |
---|
oam.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sushishop.com.tr R3 |
2023-02-28 - 2023-05-29 |
3 months | crt.sh |
connect.secure.wellsfargo.com DigiCert EV RSA CA G2 |
2022-10-11 - 2023-10-11 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
static.wellsfargo.com DigiCert EV RSA CA G2 |
2022-10-12 - 2023-10-12 |
a year | crt.sh |
www10.wellsfargomedia.com GeoTrust RSA CA 2018 |
2023-02-01 - 2024-01-31 |
a year | crt.sh |
www15.wellsfargomedia.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-11-14 - 2023-11-16 |
a year | crt.sh |
*.appdynamics.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-07-17 - 2023-07-22 |
a year | crt.sh |
*.eum-appdynamics.com DigiCert TLS RSA SHA256 2020 CA1 |
2022-06-14 - 2023-07-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://noodleking.com.tr/wells/auth/login/present.php
Frame ID: 655369D9D071CA45CC199ECC280B2C9A
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
Sign On to View Your Personal Accounts | Wells FargoDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
AppDynamics (Analytics) Expand
Detected patterns
- adrum
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Create a new password
Search URL Search Domain Scan URL
Title: find your username
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
24 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
present.php
noodleking.com.tr/wells/auth/login/ |
30 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd
connect.secure.wellsfargo.com/jenny/ |
53 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
general_alt.js
noodleking.com.tr/wells/auth/login/auth/login/static/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.13.0/css/ |
57 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfui.4bdda2282747ed96f876.chunk.css
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/stylesheets/ |
98 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.b3b5f355e18c2c42a801.chunk.css
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/stylesheets/ |
12 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
adrum-ext.js
static.wellsfargo.com/auth/static/scripts/ |
45 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glu.js
connect.secure.wellsfargo.com/AIDO/ |
68 KB 37 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mint.js
connect.secure.wellsfargo.com/AIDO/ |
254 KB 134 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pic.js
connect.secure.wellsfargo.com/PIDO/ |
88 KB 51 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
COB-BOB-IRT-enroll_park.jpg
www10.wellsfargomedia.com/auth/static/images/ |
644 KB 646 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wfui.74d5a35a9db29e7083cc.chunk.js
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/js/ |
793 KB 200 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.20e6281f5c888726b87d.chunk.js
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/js/ |
525 KB 171 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.ffd5859465d719859fd2.chunk.js
connect.secure.wellsfargo.com/auth/static/ui/loginaltsignon/public/js/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.js
static.wellsfargo.com/tracking/secure-auth/ |
33 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.min.js
connect.secure.wellsfargo.com/auth/static/prefs/ |
262 KB 148 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
connect.secure.wellsfargo.com/auth/static/prefs/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wellsfargoserif-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
26 KB 26 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-regular-400.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.13.0/webfonts/ |
13 KB 14 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
89 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
adrum-ext.b4436be974de477658d4a93afb752165.js
cdn.appdynamics.com/ |
47 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vyHb
connect.secure.wellsfargo.com/AIDO/ |
90 B 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
adrum
col.eum-appdynamics.com/eumcollector/beacons/browser/v1/APP_KEY_NOT_SET/ |
0 734 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)173 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless string| nsbuf function| nskxxdz string| NDS_LISTEN_FOCUS string| NDS_LISTEN_TOUCH string| NDS_LISTEN_KEYBOARD string| NDS_LISTEN_DEVICE_MOTION_SENSORS string| NDS_LISTEN_MOUSE function| nsrsus function| nskxx string| NDS_LISTEN_FORM string| NDS_LISTEN_ALL string| NDS_LISTEN_NONE string| nskxxd string| nsrsusbifc string| nsbufhmwwx string| nsjlzvja string| nssywf string| nsecxzoa string| nsrsu function| nsbvwade string| nsecxzoan function| nslza function| nsktxvbvrf string| nsrsusb function| getEnabledEvents string| nssywfblyv function| HashUtil function| nslkc function| nsbitgaay string| nscwjvgt string| nsbufhmw object| nsbufhmww function| nstlfi function| nsbitgaa function| nsywzmtm function| ndoIsKeyIncluded function| ndoIsModifierKey function| ndoIsNavigationKey function| ndwti function| ndoIsEditingKey object| KEYBOARD_LOCATION object| KEY_TYPE_AND_LOCATION function| ndoGetKeyboardLocation function| nsbitgaayy function| ndoGetKeyTypeAndLocationIndicator function| nsywzmtmx function| ndoGetObjectKeys boolean| nsbufh function| nsktx function| nsmeokzgx string| ndjsStaticVersion object| nsbufhm object| nssywfb boolean| nsecxz number| nsbvwad function| nslzawdg number| nscwjv function| attachEventListener function| nslzawd object| nsecxzo object| nsbvwa object| nskxxdzv object| nssyw object| nscwjvgti object| nsrsusbi boolean| nsjlzvjad string| nscwjvgtim object| nskxxdzvhk object| nsjlzvj object| nds object| nscwjvg function| nstlficoy number| numQueries object| returned string| version string| ndsWidgetVersion undefined| nscwj string| nsrsusbif string| nsecxzoank string| nssywfbl string| nskxxdzvh string| nssywfbly string| nsjlz object| nsjlzvjado object| nsbvw function| nsbvwadefx function| nshbnk function| nsjlzv function| nsecx function| nshbnkuj function| nstlf function| nstlfic function| nsktxvb function| nsktxv function| nslzawdgq function| nsmeokzg function| nshbnkujrp function| nsktxvbvr function| nslkcxf function| nshbnku function| nshbnkujr function| nsbitg function| nsmeo function| nslkcx function| nsywzmt function| nsywz function| nslzawdgqi function| validateSessionIdCookie function| nsmeokzgxf function| nstlfico function| nsbitga function| nslkcxftcy function| nsmeokz function| nslkcxft function| nslzaw function| nsywzmtmxr function| nstlficoyr function| ndwts object| nsbvwadef function| nsmeok object| ndsapi string| webId string| ndURI object| ADRUM number| adrum-start-time object| webpackJsonp boolean| isNative number| counter boolean| utag_condload undefined| new_path undefined| utag_cfg_ovrd undefined| userAgentArr object| utag function| isNotUndefinedOrNull function| getDocumentTitleLabel function| sendDataToGA boolean| __tealium_twc_switch object| utag_data object| ___sc124934 object| ___so124934 number| CLIWHIT string| PSESSIONID string| SSESSIONID string| LSESSIONID object| __tp number| __gt string| ATADUN_PATH object| loginUrlBase object| scriptParent object| loginUrlBaseNoProtocol object| getUrl string| host string| port undefined| guid object| upjsErrors function| appendFIDOEligibleInputs function| disableSubmitsCollectUserPrefs function| base64EncodingforNDSPMD function| addExceptionsToForm function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent function| undoSaveUsername function| maskedUsernameChanged function| addScriptElement function| getCookie function| appendHiddenInput function| addCookiesToForm function| setWFACookies function| generateGuid undefined| brief function| grip4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
noodleking.com.tr/ | Name: PHPSESSID Value: 2a67640c9e5c7d37d8615ab97fe9d6a4 |
|
.noodleking.com.tr/ | Name: PrestaShop-198aefdf17e1fba1f31799b6c8a8710b Value: def502005de994351bf361b2044bab0412fc5a33a13ab885e1d00ae3457d1d935c39b0ef1e2269b949c23bac72b58a618bd338d10aabe00875896cde6d863a0bbc96154e959b671edb0bcb64678e79e96c382c0eb3f1dbc80a9ce9076967097210d3da5d07b42180ba131b3721772eae5ffcbefa67ea996c001490d6567dccc2f6e105e40275b815251bbf09258161417ddd73ce91df319b9584df2eefc958c3c784d29136374ac975f02589639c17ff27256e69aea00ca0cf79f9f00bf806fd6f627decb7df89f937f6f8cc38edf1d247cfce503d |
|
.noodleking.com.tr/ | Name: utag_main Value: v_id:01870a4819a80010f67781b9e4f003074003606c00b08$_sn:1$_se:1$_ss:1$_st:1679506510057$ses_id:1679504710057%3Bexp-session$_pn:1%3Bexp-session |
|
noodleking.com.tr/ | Name: LSESSIONID Value: eyJpIjoiSVwvRUdiT21GNVNTSFNrZGZjb0MrcEE9PSIsImUiOiJaYVg5VDlFQ1FFQnY1d3ZRanJyOU5ORkxRNWp5Z2ZndzdNS1JueElzdDNLTlByUzNNWWpcL3hzYmJQSDJXQWtiOGJGTEtkd2hyNEtqbFVTZklrTE5mdTc2N1BqdndxVWQyXC9DY1RzMkRtZXpjaXl1N0RXZitaNW9FQlpqXC92ditGN2x2cXRPZzFROURxNzBUVTVZSkVjZkE9PSJ9.74bb8dc2935a351a.OTNlNDliOTliODdmZjdkMjM4YWVhN2FkOTMyZTQyZjk5MTY0ZTgxYzY0ZTY5YmY4MzhiMWM1NjQ1MWVlMDRjZQ%3D%3D |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.appdynamics.com
cdnjs.cloudflare.com
col.eum-appdynamics.com
connect.secure.wellsfargo.com
noodleking.com.tr
static.wellsfargo.com
www10.wellsfargomedia.com
www15.wellsfargomedia.com
104.17.24.14
23.2.132.13
23.2.142.77
23.200.55.18
23.200.55.23
54.71.98.196
65.9.42.33
95.173.177.114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