walltowalldiving.netcluesdemo.com
Open in
urlscan Pro
147.135.97.220
Malicious Activity!
Public Scan
Submission: On November 24 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 19th 2022. Valid for: 3 months.
This is the only time walltowalldiving.netcluesdemo.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
21 | 147.135.97.220 147.135.97.220 | 16276 (OVH) (OVH) | |
4 | 2.19.183.27 2.19.183.27 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
25 | 3 |
ASN16276 (OVH, FR)
PTR: auditions.netcluesdemo.com
walltowalldiving.netcluesdemo.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a2-19-183-27.deploy.static.akamaitechnologies.com
static.chasecdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
netcluesdemo.com
walltowalldiving.netcluesdemo.com |
197 KB |
4 |
chasecdn.com
static.chasecdn.com — Cisco Umbrella Rank: 9073 |
290 KB |
25 | 2 |
Domain | Requested by | |
---|---|---|
21 | walltowalldiving.netcluesdemo.com |
walltowalldiving.netcluesdemo.com
|
4 | static.chasecdn.com |
walltowalldiving.netcluesdemo.com
|
25 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
secure03b.chase.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
walltowalldiving.netcluesdemo.com cPanel, Inc. Certification Authority |
2022-11-19 - 2023-02-17 |
3 months | crt.sh |
static.chasecdn.com Entrust Certification Authority - L1M |
2022-09-09 - 2023-09-09 |
a year | crt.sh |
This page contains 3 frames:
Primary Page:
https://walltowalldiving.netcluesdemo.com/zee/CHASE/assets/saved_resource.php?&SERVID=Service_Login_&_Authentication=13fdf79477abbcda5cda10b045734fc756740704
Frame ID: 988893E6C150BE568F178AC9BAC8BE83
Requests: 25 HTTP requests in this frame
Frame:
data://truncated
Frame ID: F034AD0FF1F0DEF91782E903F6FE49B3
Requests: 1 HTTP requests in this frame
Frame:
data://truncated
Frame ID: ED929541871B569E15F8CAF0F81B2A33
Requests: 1 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Chase.com homepage
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
saved_resource.php
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
283 KB 119 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
appConfig.js(1).download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logon.css
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
109 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-ver.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
blue-ui.css
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
467 KB 61 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main_5c479e1cc5c88f75e139c71eb55f53e2.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main_e8d9e40e9c1b95b5265f5d41029f7c5c.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js(1).download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
boot.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
locationAPI.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
settings.js(1).download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ZIP_CODE_REGEX.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js(2).download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js(3).download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js(4).download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
view.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
domManagement.js.download
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wordmark-white.svg
walltowalldiving.netcluesdemo.com/zee/CHASE/assets/ |
1 KB 948 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background.desktop.night.7.jpeg
static.chasecdn.com/content/geo-images/images/ |
226 KB 227 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular.woff
static.chasecdn.com/content/dam/cpo-static/fonts/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-bold.woff
static.chasecdn.com/content/dam/cpo-static/fonts/ |
14 KB 14 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-semibold.woff
static.chasecdn.com/content/dam/cpo-static/fonts/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dcefont.woff
walltowalldiving.netcluesdemo.com/zee/CHASE/less/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame F034 |
342 B 342 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame ED92 |
342 B 342 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dcefont.ttf
walltowalldiving.netcluesdemo.com/zee/CHASE/less/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| a object| clientEnvProps string| clientDefaultLogLevel string| clientConsoleLogLevel string| clientAnalyticsLogLevel boolean| clientDefaultLogEnabled boolean| clientConsoleLogEnabled boolean| clientAnalyticsLogEnabled string| appLanguage function| EventLogger object| p object| loader function| initBrowserDetect1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
walltowalldiving.netcluesdemo.com/ | Name: PHPSESSID Value: 2445384d9bb1002ac8b990826f8e01e3 |
33 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
static.chasecdn.com
walltowalldiving.netcluesdemo.com
147.135.97.220
2.19.183.27
0634f735018d63980fb935914bd910ebd51ed5ed0a03c8811607aca0c2e7c532
532bcfaea1bf17bcd3c6b43b1c77c31b3966d818996b2f988a113aedb2f387c2
934fb1525c0d5ac0c61632c89321086c5680a92ffc882ece4aef014ed5528908
b8422277fc69c8e6ab51112dbf25048e40425cc497490fee251b56d7ef0ca179
ba35513b1c2eac1c940a394568dd6e2b60e0460761b1f053bb20b67d9b5ebb8a
d2113460c69de50edc6206a20deec3c2bc2733929f53817f1faca74ab34c33e3
d3bf9c143e5e360da41736b1d4e833b5ac6b6f7093ddc91ffc538233a78488d0
e6c18924b57141041541871557a81610f5d5a0138e2896b177dadc63f9c168d4
e93aa9367b4b044591b44a9df870523a5eac82198a28bdbab3862a0f0ba57b1c