lekhankunja.com
Open in
urlscan Pro
103.233.58.28
Malicious Activity!
Public Scan
Submission Tags: @jcybersec_
Submission: On July 03 via api from GB
Summary
This is the only time lekhankunja.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
20 | 103.233.58.28 103.233.58.28 | 59370 (ACCESS-NP...) (ACCESS-NP Access World Tech Pvt. Ltd.) | |
6 | 159.45.66.178 159.45.66.178 | 4196 (WELLSFARG...) (WELLSFARGO-4196) | |
2 | 23.43.126.86 23.43.126.86 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2606:4700:303... 2606:4700:3034::ac43:8625 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 13.224.102.22 13.224.102.22 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 159.45.170.139 159.45.170.139 | 10837 (WELLSFARG...) (WELLSFARGO-10837) | |
1 | 52.202.9.160 52.202.9.160 | 14618 (AMAZON-AES) (AMAZON-AES) | |
33 | 8 |
ASN59370 (ACCESS-NP Access World Tech Pvt. Ltd., NP)
PTR: sunbidesigns.accessworld.net
lekhankunja.com |
ASN20940 (AKAMAI-ASN1, EU)
PTR: a23-43-126-86.deploy.static.akamaitechnologies.com
www15.wellsfargomedia.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-224-102-22.zrh50.r.cloudfront.net
gateway.foresee.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-202-9-160.compute-1.amazonaws.com
analytics.foresee.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
lekhankunja.com
lekhankunja.com |
954 KB |
8 |
wellsfargo.com
static.wellsfargo.com rubicon.wellsfargo.com |
155 KB |
2 |
foresee.com
gateway.foresee.com analytics.foresee.com |
11 KB |
2 |
wellsfargomedia.com
www15.wellsfargomedia.com |
45 KB |
1 |
jsonblob.com
jsonblob.com |
337 B |
33 | 5 |
Domain | Requested by | |
---|---|---|
20 | lekhankunja.com |
lekhankunja.com
|
6 | static.wellsfargo.com |
lekhankunja.com
static.wellsfargo.com |
2 | rubicon.wellsfargo.com |
lekhankunja.com
|
2 | www15.wellsfargomedia.com |
lekhankunja.com
|
1 | analytics.foresee.com |
lekhankunja.com
|
1 | gateway.foresee.com |
lekhankunja.com
|
1 | jsonblob.com |
lekhankunja.com
|
33 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.wellsfargo.com |
connect.secure.wellsfargo.com |
oam.wellsfargo.com |
icomplete.wellsfargo.com |
www.wellsfargorewards.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
static.wellsfargo.com DigiCert Global CA G2 |
2019-02-07 - 2021-02-07 |
2 years | crt.sh |
www15.wellsfargomedia.com DigiCert SHA2 Secure Server CA |
2019-12-31 - 2021-03-31 |
a year | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-12-19 - 2020-10-09 |
10 months | crt.sh |
rubicon.wellsfargo.com Wells Fargo Public Trust Certification Authority 01 G2 |
2019-06-25 - 2021-06-25 |
2 years | crt.sh |
*.foresee.com Go Daddy Secure Certificate Authority - G2 |
2018-09-21 - 2020-09-21 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://lekhankunja.com/wellsfargo/session/signin.php
Frame ID: 4E6B30A80876F43989039BE4B033466B
Requests: 40 HTTP requests in this frame
16 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: Apply
Search URL Search Domain Scan URL
Title: Locations
Search URL Search Domain Scan URL
Title: Customer Service
Search URL Search Domain Scan URL
Title: Español
Search URL Search Domain Scan URL
Title: Forgot Password/Username?
Search URL Search Domain Scan URL
Title: Enroll Now
Search URL Search Domain Scan URL
Title: Enrollment FAQs
Search URL Search Domain Scan URL
Title: Online Security Guarantee
Search URL Search Domain Scan URL
Title: Privacy, Security and Legal
Search URL Search Domain Scan URL
Title: Online Access Agreement
Search URL Search Domain Scan URL
Title: Applications In Progress
Search URL Search Domain Scan URL
Title: Credit Card Rewards
Search URL Search Domain Scan URL
Title: About Wells Fargo
Search URL Search Domain Scan URL
Title: Careers
Search URL Search Domain Scan URL
Title: Sitemap
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
33 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
signin.php
lekhankunja.com/wellsfargo/session/ |
52 KB 53 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gateway.js
lekhankunja.com/wellsfargo/session/wells_files/ |
19 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nd.js
lekhankunja.com/wellsfargo/session/wells_files/ |
43 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_004.js
lekhankunja.com/wellsfargo/session/wells_files/ |
246 KB 247 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
lekhankunja.com/wellsfargo/session/wells_files/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-header.css
lekhankunja.com/wellsfargo/session/wells_files/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
content.css
lekhankunja.com/wellsfargo/session/wells_files/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wf-fonts.css
lekhankunja.com/wellsfargo/session/wells_files/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
enhanced-footer.css
lekhankunja.com/wellsfargo/session/wells_files/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glu.js
lekhankunja.com/wellsfargo/session/wells_files/ |
0 200 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
srcen.min.js
lekhankunja.com/wellsfargo/session/wells_files/ |
55 KB 56 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.js
lekhankunja.com/wellsfargo/session/wells_files/ |
57 KB 57 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_003.js
lekhankunja.com/wellsfargo/session/wells_files/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag_002.js
lekhankunja.com/wellsfargo/session/wells_files/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WF_stagecoach_rgb_ylw_F1.svg
lekhankunja.com/wellsfargo/session/wells_files/ |
226 KB 227 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-userprefs.js
lekhankunja.com/wellsfargo/session/wells_files/ |
187 KB 187 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.js
lekhankunja.com/wellsfargo/session/wells_files/ |
23 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
lekhankunja.com/wellsfargo/session/wells_files/ |
1023 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.js
static.wellsfargo.com/tracking/main/ |
154 KB 30 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
467 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
889 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 22 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
839 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/ |
22 KB 23 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
conutils-6.9.0.js
lekhankunja.com/auth/static/scripts/ |
0 200 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
atadun.js
lekhankunja.com/auth/static/prefs/ |
0 200 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c039c0a3-2989-11ea-a02c-a12968f28a9c
jsonblob.com/api/jsonBlob/ |
78 B 337 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fs.utils.js
static.wellsfargo.com/tracking/survey/code/ |
43 KB 14 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
utag.319.js
static.wellsfargo.com/tracking/main/ |
6 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fs.compress.js
static.wellsfargo.com/tracking/survey/code/ |
31 KB 12 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
detector-dom.min.js
static.wellsfargo.com/tracking/gb/ |
268 KB 83 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
config.json
gateway.foresee.com/sites/wellsfargo/production/ |
93 KB 11 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fs.trigger.js
static.wellsfargo.com/tracking/survey/code/ |
33 KB 11 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cls_report
rubicon.wellsfargo.com/glassbox/reporting/0C458F45-AC71-02CE-34D8-401C8A313B38/ |
8 B 926 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
events
analytics.foresee.com/ingest/ |
45 B 349 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cls_report
rubicon.wellsfargo.com/glassbox/reporting/0C458F45-AC71-02CE-34D8-401C8A313B38/ |
382 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Wells Fargo (Banking)157 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| ndoGetObjectKeys function| nsxxbkmfmj boolean| nsxxbk string| ndjsStaticVersion function| nszstur object| nsszdff function| nslzy function| nsgynr object| nslzywkid boolean| nszsturam number| nsxxbkmfm function| nskguqm number| nslzyw object| nskmgrrzq object| nslzywki object| nskguq function| HashUtil object| nskguqmtar object| nsszdffljz object| nsdekohx boolean| nsxxbkm string| nslzywk object| nds object| nskgu number| numQueries object| returned string| version undefined| nsdekoh string| nsszd string| nsszdfflj function| nsdek string| nsdekohxz string| nsgynrt string| nszstura string| nsdekohxzp object| nsszdffl function| nsxxbkmf object| nszst function| nsxxb function| nskmgrrzqc function| nszstu function| nsgynrtmis function| nskguqmta function| nsgynrtmi function| nsgyn function| nsdeko function| nskmgr function| nskguqmt function| nslzywkidt function| nskmgrr function| nsszdf function| nskmgrrz function| ndwts function| nsgynrtm function| nszsturamw function| nsrsoqgiw function| nsakxshrd function| nsvfo function| nsrsoq function| nsakx function| nsearl function| nsakxsh function| nsrhnkig function| nsearldqim function| nsrjmxge function| nsvfosrqw function| nsvfosrqwk function| nsrsoqg function| nsearldqi function| nsmht function| nsvfos object| nskmg function| nsrhnkigac function| ndwti object| ndsapi string| webId string| ndURI object| utag_data object| FSR object| FSFB function| _acsDefine function| _fsDefine function| _acsRequire function| _fsRequire function| _acsNormalizeUrl function| _fsNormalizeUrl function| _fsNormalizeAssetUrl boolean| _fsAlreadyBootedSDK object| _0x29bc function| _0x1c61 object| Email function| $ function| jQuery string| USERPREFS_PATH string| UPRESOURCE_PATH string| ATADUN_PATH string| loginUrlBase object| scriptParent string| loginUrlBaseNoProtocol object| getUrl string| host string| port undefined| guid function| disableSubmitsCollectUserPrefs function| addLoginFormFieldsAndSubmit function| jsEnabled function| addEvent object| UserPrefsHelper object| collector function| loadUserPrefs function| submitUserPrefs function| getUserPrefsOnPageLoad function| undoSaveUsername function| maskedUsernameChanged function| addScriptElement function| getCookie function| appendHiddenInput function| addCookiesToForm function| generateGuid undefined| brief object| lun3 boolean| isNative object| LoginForm object| Search function| updateCustomSelect function| enrollPrivacySecLinkHandler function| acsReady boolean| utag_condload string| new_path object| utag_cfg_ovrd object| userAgentArr undefined| pathname undefined| urlArray undefined| url undefined| sRegExInput object| utag function| isNotUndefinedOrNull function| getDocumentTitleLable undefined| customDMPEvent undefined| getPayload undefined| fireDMPEvent undefined| isThankYouPage function| utag_pad function| utag_visitor_id string| gtagRename object| dataLayer function| gtag string| uName string| uPass string| GoogleAnalyticsObject function| ga function| fsReady function| __acsReady__ function| __fsReady__ object| _detector3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.lekhankunja.com/ | Name: _cls_s Value: 45892ef4-747e-4475-a978-9b1b7c6118f7:0 |
|
.lekhankunja.com/ | Name: _cls_v Value: 9fd72d91-8bbf-47fa-830a-afb42ffb7c0b |
|
lekhankunja.com/ | Name: PHPSESSID Value: e67292749ec5906e4be910498979a45a |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
analytics.foresee.com
gateway.foresee.com
jsonblob.com
lekhankunja.com
rubicon.wellsfargo.com
static.wellsfargo.com
www15.wellsfargomedia.com
103.233.58.28
13.224.102.22
159.45.170.139
159.45.66.178
23.43.126.86
2606:4700:3034::ac43:8625
52.202.9.160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