citibank-onlinebanking.herokuapp.com Open in urlscan Pro
3.221.114.178  Malicious Activity! Public Scan

Submitted URL: http://secure-citibank.com/
Effective URL: https://citibank-onlinebanking.herokuapp.com/
Submission: On March 19 via api from GB

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 2 HTTP transactions. The main IP is 3.221.114.178, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is citibank-onlinebanking.herokuapp.com.
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on June 15th 2020. Valid for: a year.
This is the only time citibank-onlinebanking.herokuapp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Wells Fargo (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 148.66.136.67 26496 (AS-26496-...)
1 3.221.114.178 14618 (AMAZON-AES)
1 192.64.118.79 22612 (NAMECHEAP...)
2 3
Domain Requested by
1 kjtradings.com citibank-onlinebanking.herokuapp.com
1 citibank-onlinebanking.herokuapp.com
1 secure-citibank.com 1 redirects
2 3

This site contains no links.

Subject Issuer Validity Valid
*.herokuapp.com
DigiCert SHA2 High Assurance Server CA
2020-06-15 -
2021-07-07
a year crt.sh
kjtradings.com
Sectigo RSA Domain Validation Secure Server CA
2020-06-15 -
2021-06-15
a year crt.sh

This page contains 1 frames:

Primary Page: https://citibank-onlinebanking.herokuapp.com/
Frame ID: 75642793BA21733617C59A8281432497
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://secure-citibank.com/ HTTP 301
    https://citibank-onlinebanking.herokuapp.com/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Overall confidence: 100%
Detected patterns
  • headers server /^Cowboy$/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

67 kB
Transfer

68 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://secure-citibank.com/ HTTP 301
    https://citibank-onlinebanking.herokuapp.com/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
citibank-onlinebanking.herokuapp.com/
Redirect Chain
  • http://secure-citibank.com/
  • https://citibank-onlinebanking.herokuapp.com/
30 KB
31 KB
Document
General
Full URL
https://citibank-onlinebanking.herokuapp.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.221.114.178 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-221-114-178.compute-1.amazonaws.com
Software
Cowboy / Express
Resource Hash
080be717d43b3c58e3eca72791efb952e01dc301043949cbe2e66699271b9793

Request headers

Host
citibank-onlinebanking.herokuapp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Server
Cowboy
Connection
keep-alive
X-Powered-By
Express
Access-Control-Allow-Origin
*
Access-Control-Allow-Headers
Origin, X-Requested-With, Content-Type, Accept, Authorization
Content-Type
text/html; charset=utf-8
Content-Length
30974
Etag
W/"78fe-/GRgFGL96cuRWzVIOOSAg7EjBTc"
Date
Fri, 19 Mar 2021 09:08:45 GMT
Via
1.1 vegur

Redirect headers

Date
Fri, 19 Mar 2021 09:08:45 GMT
Server
Apache
Location
https://citibank-onlinebanking.herokuapp.com/
Content-Length
253
Keep-Alive
timeout=5
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
citiii.png
kjtradings.com/online/
36 KB
37 KB
Image
General
Full URL
https://kjtradings.com/online/citiii.png
Requested by
Host: citibank-onlinebanking.herokuapp.com
URL: https://citibank-onlinebanking.herokuapp.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.64.118.79 , United States, ASN22612 (NAMECHEAP-NET, US),
Reverse DNS
server82-5.web-hosting.com
Software
Apache /
Resource Hash
e4688427398b18e24b3f6005f1a776a762cca781168ad2f272b5838ac7303c45

Request headers

Referer
https://citibank-onlinebanking.herokuapp.com/
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

date
Fri, 19 Mar 2021 09:08:46 GMT
last-modified
Thu, 18 Mar 2021 21:20:44 GMT
server
Apache
accept-ranges
bytes
content-length
37283
content-type
image/png
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1ed889a15705bc76729d29d715c64f3d7f35de2ea519e1d2704924cf40d9e30d

Request headers

Referer
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Content-Type
image/jpeg

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Wells Fargo (Banking)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| callform

0 Cookies