go-sell.com.co
Open in
urlscan Pro
138.128.187.58
Malicious Activity!
Public Scan
Effective URL: https://go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/p2zefdm0ybbot7fem60wrew6.php?9bLJLK1635005318783ff1...
Submission: On October 23 via api from US — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 3rd 2021. Valid for: 3 months.
This is the only time go-sell.com.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 138.128.187.58 138.128.187.58 | 33182 (DIMENOC) (DIMENOC) | |
12 | 159.45.2.180 159.45.2.180 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
14 | 3 |
ASN33182 (DIMENOC, US)
PTR: 138-128-187-58.static.hostdime.com
go-sell.com.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
wellsfargo.com
oam.wellsfargo.com |
27 KB |
3 |
go-sell.com.co
1 redirects
go-sell.com.co |
11 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
12 | oam.wellsfargo.com |
go-sell.com.co
oam.wellsfargo.com |
3 | go-sell.com.co |
1 redirects
go-sell.com.co
|
14 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
go-sell.com.co cPanel, Inc. Certification Authority |
2021-10-03 - 2022-01-01 |
3 months | crt.sh |
oam.wellsfargo.com DigiCert EV RSA CA G2 |
2020-07-09 - 2022-07-14 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/p2zefdm0ybbot7fem60wrew6.php?9bLJLK1635005318783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50&email=
Frame ID: 48BCA106584C7C35FAD724A5CDD88E77
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
Wells Fargo - Please confirm your identityPage URL History Show full URLs
-
https://go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/
HTTP 302
https://go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/p2zefdm0ybbot7fem60wrew6.php?9b... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: | Privacy, Cookies, Security & Legal
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/
HTTP 302
https://go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/p2zefdm0ybbot7fem60wrew6.php?9bLJLK1635005318783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50783ff1fc0256f6a4dc176772b5720b50&email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
p2zefdm0ybbot7fem60wrew6.php
go-sell.com.co/Wellsfargo%20onlinebanking/Wells/verify/mail/ Redirect Chain
|
8 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.css
oam.wellsfargo.com/oam/static/css/ssep/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.header.css
oam.wellsfargo.com/oam/static/css/ssep/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.button.css
oam.wellsfargo.com/oam/static/css/ssep/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.messaging.css
oam.wellsfargo.com/oam/static/css/ssep/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.input.css
oam.wellsfargo.com/oam/static/css/ssep/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.dropdown.selector.css
oam.wellsfargo.com/oam/static/css/ssep/ |
6 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.popover.css
oam.wellsfargo.com/oam/static/css/ssep/ |
6 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.tabs.css
oam.wellsfargo.com/oam/static/css/ssep/ |
8 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.timeout.css
oam.wellsfargo.com/oam/static/css/ssep/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme.ssep.twofa.css
oam.wellsfargo.com/oam/static/css/twofa/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
shim.gif
oam.wellsfargo.com/oam/static/images/ |
43 B 764 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icn-ind-lock.png
go-sell.com.co/oam/static/images/ |
2 KB 2 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
270 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
330 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icn-img-wf-logo-large-glob-232x20-096741-v01_01@1x.png
oam.wellsfargo.com/oam/static/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.go-sell.com.co/ | Name: go_sell_session Value: mLDIZ7gClUjNc3pfPKMZEMBb0DxsjyP5Qc21GBiz |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
go-sell.com.co
oam.wellsfargo.com
138.128.187.58
159.45.2.180
15a1c771dbbed834f8497627b7879a2f438bd4df5d3df8852c49e1f6581c479a
1905884317b7966c4f1751ee4cb9b3b1475e09dec8ffab9e6f5cc0a007c68d36
312b4c2218ba79e5042794126f67aeb39f5ce20645dc9c6856c2b660345fb63a
51adbf5bc6f1f859b465cdba71920ad306f53c1898dcf4a5c53e174942cac4c0
872c9ca9be690c4ea9d7e7d402470ef053ecc7bde2ab01068452d795b37cd540
89fe0ee6020314794fc2cfeacf3d10c31050cfe56f8ebddf1ed0a33fbe941fa7
9736da315a97e55ca576d457e5d8aa61a9e1d9bbea3cc93e667dfd06bab6ece5
9fd6c5aa6c7585c1e5e3f3a08b673813b06220d94d8b6da24b491fc03e5f968c
a0686edbc495d60b175d648c206ff79ebc360b5173c139937eb3ae9c54adba71
b8c92507df74f9a7650e70120d23317662b98615269b10e8904cc3f156e1b3e1
be725f179289d5d1915d13c4e9179e68e63fdb33ca569ea214e99226a0317dd2
d97bba3cd654c4c2df13c0abc219e99691aad0276a6fd2287ca835f2f7b0214e
e2830d975f83aab8c06d41c36c6d3df1161b12bd874a781a0daabd68e503c911
e2f1104899a430463d7632028c7b5cd2716148d65e7be31302449540190cce84
e8135d48794eb6597d16202c9ad7a9689901c6fedcfd84a1127e49a3ef53896e
e838e02ae34be194ea871ccbd7896be41212016eaccb49b1b6a5cd5ba9a3226a