wellsfargo-fraud-alert.com Open in urlscan Pro
193.106.191.135  Malicious Activity! Public Scan

Submitted URL: http://wellsfargo-fraud-alert.com/
Effective URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBH...
Submission: On November 16 via api from GB — Scanned from GB

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 12 HTTP transactions. The main IP is 193.106.191.135, located in Krasnoyarsk, Russian Federation and belongs to KANZAS-AS, RU. The main domain is wellsfargo-fraud-alert.com.
TLS certificate: Issued by R3 on November 11th 2022. Valid for: 3 months.
This is the only time wellsfargo-fraud-alert.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
2 6 193.106.191.135 59940 (KANZAS-AS)
1 2606:4700:303... 13335 (CLOUDFLAR...)
5 2606:4700::68... 13335 (CLOUDFLAR...)
2 23.203.89.234 16625 (AKAMAI-AS)
12 4
Apex Domain
Subdomains
Transfer
6 wellsfargo-fraud-alert.com
wellsfargo-fraud-alert.com
736 KB
5 cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 201
90 KB
2 wellsfargomedia.com
www15.wellsfargomedia.com — Cisco Umbrella Rank: 26356
45 KB
1 killbot.org
files.killbot.org
12 4
Domain Requested by
6 wellsfargo-fraud-alert.com 2 redirects wellsfargo-fraud-alert.com
5 cdnjs.cloudflare.com wellsfargo-fraud-alert.com
2 www15.wellsfargomedia.com wellsfargo-fraud-alert.com
1 files.killbot.org wellsfargo-fraud-alert.com
12 4

This site contains no links.

Subject Issuer Validity Valid
wellsfargo-fraud-alert.com
R3
2022-11-11 -
2023-02-09
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-06-29 -
2023-06-28
a year crt.sh
www15.wellsfargomedia.com
DigiCert SHA2 Secure Server CA
2021-12-31 -
2023-01-03
a year crt.sh

This page contains 1 frames:

Primary Page: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Frame ID: 1FE3E0848B6C4532030C55F5BB03C81F
Requests: 12 HTTP requests in this frame

Screenshot

Page Title

Sign On to View Your Personal Accounts | Wells Fargo

Page URL History Show full URLs

  1. http://wellsfargo-fraud-alert.com/ HTTP 301
    https://wellsfargo-fraud-alert.com/ HTTP 302
    https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3I... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

12
Requests

100 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

870 kB
Transfer

1144 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://wellsfargo-fraud-alert.com/ HTTP 301
    https://wellsfargo-fraud-alert.com/ HTTP 302
    https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

12 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
wellsfargo-fraud-alert.com/
Redirect Chain
  • http://wellsfargo-fraud-alert.com/
  • https://wellsfargo-fraud-alert.com/
  • https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
14 KB
14 KB
Document
General
Full URL
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
364eeffc999b466cd0df7f484d74b6473ba3a15cb0f919056a4333ee6e3d58ea

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Wed, 16 Nov 2022 13:56:46 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive
timeout=5, max=99
Pragma
no-cache
Server
Apache
Transfer-Encoding
chunked

Redirect headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Content-Length
0
Content-Type
text/html; charset=UTF-8
Date
Wed, 16 Nov 2022 13:56:46 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive
timeout=5, max=100
Pragma
no-cache
Server
Apache
location
login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
killbot-security.js
files.killbot.org/.cdn-cgi/
0
0
Script
General
Full URL
https://files.killbot.org/.cdn-cgi/killbot-security.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3030::6815:ba0 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

wfui.4bdda2282747ed96f876.chunk.css
wellsfargo-fraud-alert.com/file/
98 KB
98 KB
Stylesheet
General
Full URL
https://wellsfargo-fraud-alert.com/file/wfui.4bdda2282747ed96f876.chunk.css
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
7918205c0c27d2ca0960c54c9c25709ee997294843c5ca2fdde64e6e2f2459a0

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Wed, 16 Nov 2022 13:56:47 GMT
Last-Modified
Thu, 17 Feb 2022 03:21:14 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
100499
main.b3b5f355e18c2c42a801.chunk.css
wellsfargo-fraud-alert.com/file/
12 KB
12 KB
Stylesheet
General
Full URL
https://wellsfargo-fraud-alert.com/file/main.b3b5f355e18c2c42a801.chunk.css
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
5e68ea9ca9cce32f91979f88142e963f0ff950cc1f1b6c3246eaaaf2f3091c58

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Wed, 16 Nov 2022 13:56:47 GMT
Last-Modified
Thu, 17 Feb 2022 03:21:14 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
11856
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0-beta1/
256 KB
64 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0-beta1/jquery.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
78f27c3d7cb5d766466703adc7f7ad7706b7fb05514eec39be0aa253449bd0f8
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

date
Wed, 16 Nov 2022 13:56:46 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
64845
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
64839
last-modified
Mon, 04 May 2020 16:11:48 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec4-40023"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=3%2BfbXSgHmfyVDK3Cr939BZRx6dc2A%2BrKjXfbn3xkLppaNugd6Z%2F0UqHhBF6SfI2d3FJvb8Jpri8FMhGgkPXmYHal%2BsZ6uOe3X58rgNeLpHNeJKHlPs0hAX4al14iFA%2Fys3jKcJPDr%2B0cfS%2FlyUp69Q3e"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
76b0bb61ad9d772b-LHR
expires
Mon, 06 Nov 2023 13:56:46 GMT
jquery.validate.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/
45 KB
11 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/jquery.validate.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
2aecc3e7494318d2398eafe2a6de21c03a52264ddf86c7934758ddbda06864bb
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

date
Wed, 16 Nov 2022 13:56:46 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
3415192
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
10622
last-modified
Mon, 04 May 2020 16:11:46 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec2-b4b9"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=LQwmbPaklpa%2Bm1qtxdqb8ao5v5WGlhD%2F6CWTMGk%2BaZj0uLA%2B8QHiCMGpiVQowRYVSWkrCNdwhBZ3fMtBBN2k4jpJJoPKeS5FSoX2Ee0XSw5sstKjII5JkujhXPjB2ucvw3wruuG6FQFj21gb%2B9Ptxltt"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
76b0bb61ad9e772b-LHR
expires
Mon, 06 Nov 2023 13:56:46 GMT
additional-methods.js
cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/
38 KB
9 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery-validate/1.15.0/additional-methods.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1d95e0e21c160558eb3d2bacd76779048cb600cc04e15264e0835f4f86b4b375
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

date
Wed, 16 Nov 2022 13:56:46 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
506215
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
9078
last-modified
Mon, 04 May 2020 16:11:46 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec2-985d"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=c2%2FkVtAEeYTJ8oVny4QGUpUZgHkKFciRVMAP%2BsKJeYpGcYQ5AsMvWPH%2ByPmJKOqhDJqxfwy5Bo7pN4%2Fir83oW3shnsmArQaG6r9eurrOCxApHH3bfqVqfYvS0KIaUGHRnqjOV%2BsYc%2BjNdNipEj7nRvUH"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
76b0bb61ada0772b-LHR
expires
Mon, 06 Nov 2023 13:56:46 GMT
jquery.maskedinput.js
cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/
10 KB
3 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery.maskedinput/1.4.1/jquery.maskedinput.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
7ef14a1e070a6a2ec9ff44ccf5e923cb2a460c5861a3db8a9ae1e21557d27020
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

date
Wed, 16 Nov 2022 13:56:46 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
1713232
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
2306
last-modified
Mon, 04 May 2020 16:11:47 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec3-284d"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=1rEbVxCA0YkqiJlYdK%2BMTpF9Qn1wfOZ3lizxSAyaHXWjCS7PwqDqe1UFMeaMJlNLWNubRh6ZVf62ylOs78%2BAILgF7GUL5KNPXEqQCUM2Zy3L%2Fzd64WKQaHX%2BLPvOKUfzgXz1B6hbsRI3CHtcMvS5lGem"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
76b0bb61ada3772b-LHR
expires
Mon, 06 Nov 2023 13:56:46 GMT
jquery.payment.js
cdnjs.cloudflare.com/ajax/libs/jquery.payment/1.3.2/
17 KB
3 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery.payment/1.3.2/jquery.payment.js
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6811:180e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
60499c4335239d51fa6ef40bd909ba8e62a2a468b16b74f0fd9fadac1eee4bbf
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

date
Wed, 16 Nov 2022 13:56:46 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
strict-transport-security
max-age=15780000
age
3041232
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
3067
last-modified
Mon, 04 May 2020 16:11:47 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec3-421b"
vary
Accept-Encoding
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=XDC02vC%2FAd1vlCVuFcF7hit2BHhjsXghBXcFINneuTUjJHWi8SDk8hNHyldR3bk7p2kTM7GxeM2CVXOjGhuwg%2FmhARL7QYthaLozqRO62SD3B7FaNvx1OtZ52bDGY4VrJFmirkvHmFCamqltlO20njcK"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
public, max-age=30672000
accept-ranges
bytes
timing-allow-origin
*
cf-ray
76b0bb61ada5772b-LHR
expires
Mon, 06 Nov 2023 13:56:46 GMT
COB-BOB-IRT-enroll_balloons.jpg
wellsfargo-fraud-alert.com/file/
611 KB
611 KB
Image
General
Full URL
https://wellsfargo-fraud-alert.com/file/COB-BOB-IRT-enroll_balloons.jpg
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
193.106.191.135 Krasnoyarsk, Russian Federation, ASN59940 (KANZAS-AS, RU),
Reverse DNS
Software
Apache /
Resource Hash
b8325d272c72a041414d9fb349e9d4bca5e7fc8ad66f47a719e491960afa5683

Request headers

accept-language
en-GB,en;q=0.9
Referer
https://wellsfargo-fraud-alert.com/login.php?ssl=true&session=LgyFOMe0HGUsgJFslKYxlCzxrG9caL5Y4e3YiPzZtADW1JP3IlvlNIlhiEXWfAEzZdOBHTyTWBkJ31MsBrjaqSlvoSEfJlxsCkr2DCEbbfOpW5iyvGoCQ5WgB5C9pfIKKo
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Wed, 16 Nov 2022 13:56:47 GMT
Last-Modified
Thu, 17 Feb 2022 03:21:48 GMT
Server
Apache
Content-Type
image/jpeg
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
625433
wellsfargosans-rg.woff2
www15.wellsfargomedia.com/wfui/css/fonts/
22 KB
22 KB
Font
General
Full URL
https://www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-rg.woff2
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/file/wfui.4bdda2282747ed96f876.chunk.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.203.89.234 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-203-89-234.deploy.static.akamaitechnologies.com
Software
KONICHIWA/2.0 /
Resource Hash
631f3b6267a831a8d67c45e480b5d5a2601f10ff8708bcf3a45a41b377a129cc
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://wellsfargo-fraud-alert.com/
Origin
https://wellsfargo-fraud-alert.com
accept-language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

unused62
8096267
strict-transport-security
max-age=31536000; includeSubdomains;
date
Wed, 16 Nov 2022 13:56:47 GMT
x-content-type-options
nosniff
last-modified
Tue, 26 Feb 2019 19:38:34 GMT
server
KONICHIWA/2.0
etag
"5798-582d133e56280"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
content-length
22424
x-xss-protection
1; mode=block
expires
Thu, 16 Nov 2023 13:56:47 GMT
wellsfargosans-sbd.woff2
www15.wellsfargomedia.com/wfui/css/fonts/
22 KB
22 KB
Font
General
Full URL
https://www15.wellsfargomedia.com/wfui/css/fonts/wellsfargosans-sbd.woff2
Requested by
Host: wellsfargo-fraud-alert.com
URL: https://wellsfargo-fraud-alert.com/file/wfui.4bdda2282747ed96f876.chunk.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.203.89.234 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-203-89-234.deploy.static.akamaitechnologies.com
Software
KONICHIWA/2.0 /
Resource Hash
ab9d8c97b35ed86b6224aca911aa304a0d7dbcbd28e00a4c6585b96e28ed30ba
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains;
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://wellsfargo-fraud-alert.com/
Origin
https://wellsfargo-fraud-alert.com
accept-language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

unused62
8096267
strict-transport-security
max-age=31536000; includeSubdomains;
date
Wed, 16 Nov 2022 13:56:47 GMT
x-content-type-options
nosniff
last-modified
Tue, 26 Feb 2019 19:38:34 GMT
server
KONICHIWA/2.0
etag
"5848-582d133e56280"
x-frame-options
SAMEORIGIN
content-type
font/woff2
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
content-length
22600
x-xss-protection
1; mode=block
expires
Thu, 16 Nov 2023 13:56:47 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
wellsfargo-fraud-alert.com/ Name: PHPSESSID
Value: 0a78676b95530e80007d766de561f4d5

1 Console Messages

Source Level URL
Text
network error URL: https://files.killbot.org/.cdn-cgi/killbot-security.js
Message:
Failed to load resource: the server responded with a status of 404 ()