Submitted URL: http://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Effective URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Submission: On October 31 via manual from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 207.251.96.248, located in United States and belongs to STEALTH, US. The main domain is ebm.connect.wellsfargoemail.com. The Cisco Umbrella rank of the primary domain is 642772.
TLS certificate: Issued by Wells Fargo Public Trust Certificatio... on August 30th 2022. Valid for: a year.
This is the only time ebm.connect.wellsfargoemail.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 207.251.96.248 8002 (STEALTH)
2 173.213.4.52 53316 (ASN-CHEET...)
3 2
Apex Domain
Subdomains
Transfer
4 wellsfargoemail.com
ebm.connect.wellsfargoemail.com — Cisco Umbrella Rank: 642772
f.connect.wellsfargoemail.com — Cisco Umbrella Rank: 377601
50 KB
3 1
Domain Requested by
2 f.connect.wellsfargoemail.com ebm.connect.wellsfargoemail.com
2 ebm.connect.wellsfargoemail.com 1 redirects
3 2

This site contains no links.

Subject Issuer Validity Valid
ebm.connect.wellsfargoemail.com
Wells Fargo Public Trust Certification Authority 01 G2
2022-08-30 -
2023-09-30
a year crt.sh
f.connect.wellsfargoemail.com
Wells Fargo Public Trust Certification Authority 01 G2
2022-04-04 -
2023-04-04
a year crt.sh

This page contains 1 frames:

Primary Page: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Frame ID: 2E583ACE6E79D7D5C5B0B4AA3361F791
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Wells Fargo Unsubscribe Page

Page URL History Show full URLs

  1. http://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60 HTTP 302
    https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60 Page URL

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

2
Subdomains

2
IPs

1
Countries

49 kB
Transfer

49 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60 HTTP 302
    https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request regf2
ebm.connect.wellsfargoemail.com/r/
Redirect Chain
  • http://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
  • https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
5 KB
6 KB
Document
General
Full URL
https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
207.251.96.248 , United States, ASN8002 (STEALTH, US),
Reverse DNS
ebm.connect.wellsfargoemail.com
Software
Apache /
Resource Hash
b3c89c152454fb12c8ffec6a2add4554b495aea5c6725894764e296a59641aa3

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html
Date
Mon, 31 Oct 2022 12:28:42 GMT
Keep-Alive
timeout=5, max=100
P3P
policyref="/w3c/p3p.xml",CP="NON DSP COR CUR ADMo DEVo TAIi IVAi IVDi OUR DELi IND PHY ONL UNI COM NAV DEM"
Server
Apache
Transfer-Encoding
chunked

Redirect headers

Connection
Keep-Alive
Content-Length
0
Location
https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Server
BigIP
wfi000_6720734_WF-Advisors-logo_640x100_v2.jpg
f.connect.wellsfargoemail.com/i/38/2082566297/
39 KB
39 KB
Image
General
Full URL
https://f.connect.wellsfargoemail.com/i/38/2082566297/wfi000_6720734_WF-Advisors-logo_640x100_v2.jpg
Requested by
Host: ebm.connect.wellsfargoemail.com
URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
173.213.4.52 , United States, ASN53316 (ASN-CHEETA-MAIL, US),
Reverse DNS
Software
nginx /
Resource Hash
35dda35514c7f98884abc393cb9880f0a9048b0da93879d14591e33e4496a1c6

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ebm.connect.wellsfargoemail.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

Date
Mon, 31 Oct 2022 12:28:43 GMT
Last-Modified
Sat, 30 May 2020 02:29:58 GMT
Server
nginx
ETag
"5ed1c526-9c29"
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
39977
wfi000_6720734_WF-Advisors-logo_209x14_v2.png
f.connect.wellsfargoemail.com/i/38/2082566297/
4 KB
4 KB
Image
General
Full URL
https://f.connect.wellsfargoemail.com/i/38/2082566297/wfi000_6720734_WF-Advisors-logo_209x14_v2.png
Requested by
Host: ebm.connect.wellsfargoemail.com
URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
173.213.4.52 , United States, ASN53316 (ASN-CHEETA-MAIL, US),
Reverse DNS
Software
nginx /
Resource Hash
04b663d3f26d6d651e65a8b080a3889e9c51720e045b7c5f86921264824f2547

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://ebm.connect.wellsfargoemail.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/107.0.5304.87 Safari/537.36

Response headers

Date
Mon, 31 Oct 2022 12:28:43 GMT
Last-Modified
Sat, 30 May 2020 02:29:58 GMT
Server
nginx
ETag
"5ed1c526-110a"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
4362

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation

0 Cookies

4 Console Messages

Source Level URL
Text
security warning URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Message:
Mixed Content: The page at 'https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60' was loaded over HTTPS, but requested an insecure element 'http://f.connect.wellsfargoemail.com/i/38/2082566297/wfi000_6720734_WF-Advisors-logo_640x100_v2.jpg'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security warning URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60
Message:
Mixed Content: The page at 'https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60' was loaded over HTTPS, but requested an insecure element 'http://f.connect.wellsfargoemail.com/i/38/2082566297/wfi000_6720734_WF-Advisors-logo_209x14_v2.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security warning URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60(Line 138)
Message:
Mixed Content: The page at 'https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60' was loaded over HTTPS, but requested an insecure element 'http://f.connect.wellsfargoemail.com/i/38/2082566297/wfi000_6720734_WF-Advisors-logo_640x100_v2.jpg'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html
security warning URL: https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60(Line 138)
Message:
Mixed Content: The page at 'https://ebm.connect.wellsfargoemail.com/r/regf2?aid=2082566297&n=60' was loaded over HTTPS, but requested an insecure element 'http://f.connect.wellsfargoemail.com/i/38/2082566297/wfi000_6720734_WF-Advisors-logo_209x14_v2.png'. This request was automatically upgraded to HTTPS, For more information see https://blog.chromium.org/2019/10/no-more-mixed-messages-about-https.html