emailacountupdate.tk Open in urlscan Pro
2606:4700:3037::6818:726e  Malicious Activity! Public Scan

Submitted URL: https://omgemailchecker-secondary.z13.web.core.windows.net/omgindex.htm?email=dan.munthe@alliancepipeline.com
Effective URL: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Submission: On May 13 via api from US

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 7 HTTP transactions. The main IP is 2606:4700:3037::6818:726e, located in United States and belongs to CLOUDFLARENET, US. The main domain is emailacountupdate.tk.
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on April 29th 2020. Valid for: 5 months.
This is the only time emailacountupdate.tk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 52.239.161.65 8075 (MICROSOFT...)
1 7 2606:4700:303... 13335 (CLOUDFLAR...)
7 2
Domain Requested by
7 emailacountupdate.tk 1 redirects omgemailchecker-secondary.z13.web.core.windows.net
emailacountupdate.tk
1 omgemailchecker-secondary.z13.web.core.windows.net
7 2

This site contains no links.

Subject Issuer Validity Valid
*.web.core.windows.net
Microsoft IT TLS CA 4
2020-04-17 -
2022-04-17
2 years crt.sh
sni.cloudflaressl.com
CloudFlare Inc ECC CA-2
2020-04-29 -
2020-10-09
5 months crt.sh

This page contains 1 frames:

Primary Page: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Frame ID: D2643C9C9B6C06DFB22562D1B24A1582
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://omgemailchecker-secondary.z13.web.core.windows.net/omgindex.htm?email=dan.munthe@alliancepipeline.com Page URL
  2. http://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com HTTP 301
    https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
  • script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

7
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

68 kB
Transfer

284 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://omgemailchecker-secondary.z13.web.core.windows.net/omgindex.htm?email=dan.munthe@alliancepipeline.com Page URL
  2. http://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com HTTP 301
    https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
omgindex.htm
omgemailchecker-secondary.z13.web.core.windows.net/
597 B
967 B
Document
General
Full URL
https://omgemailchecker-secondary.z13.web.core.windows.net/omgindex.htm?email=dan.munthe@alliancepipeline.com
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.161.65 San Jose, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
b1d91f1902e5727a177de02ee839be4047d05574fbd71053cacd6eb1f2c1ef68

Request headers

Host
omgemailchecker-secondary.z13.web.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
597
Content-Type
text/html
Content-MD5
xFTYY8RpLOJZKp7tq+XA8g==
Last-Modified
Wed, 13 May 2020 11:33:15 GMT
Accept-Ranges
bytes
ETag
"0x8D7F7316D29B835"
Server
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
f15d62a3-801e-0066-7826-290958000000
x-ms-version
2018-03-28
Date
Wed, 13 May 2020 13:01:51 GMT
Primary Request index.php
emailacountupdate.tk/pz/
Redirect Chain
  • http://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
  • https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
5 KB
2 KB
Document
General
Full URL
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Requested by
Host: omgemailchecker-secondary.z13.web.core.windows.net
URL: https://omgemailchecker-secondary.z13.web.core.windows.net/omgindex.htm?email=dan.munthe@alliancepipeline.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:726e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PHP/7.4.5 PleskLin
Resource Hash
21ce7ec476c5a384a5bed605b2eff0048621fb6fb5b71941527a3b82b052b301

Request headers

:method
GET
:authority
emailacountupdate.tk
:scheme
https
:path
/pz/index.php?email=dan.munthe@alliancepipeline.com
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
cookie
__cfduid=d9ab4670c28302f2d213b3666658c90771589374912
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
https://omgemailchecker-secondary.z13.web.core.windows.net/omgindex.htm?email=dan.munthe@alliancepipeline.com

Response headers

status
200
date
Wed, 13 May 2020 13:01:53 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.4.5 PleskLin
vary
Accept-Encoding
cf-cache-status
DYNAMIC
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
592c92181888c29f-FRA
content-encoding
br
cf-request-id
02afb9a30d0000c29f7bb2e200000001

Redirect headers

Date
Wed, 13 May 2020 13:01:53 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Set-Cookie
__cfduid=d9ab4670c28302f2d213b3666658c90771589374912; expires=Fri, 12-Jun-20 13:01:52 GMT; path=/; domain=.emailacountupdate.tk; HttpOnly; SameSite=Lax
Location
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
CF-Cache-Status
DYNAMIC
Server
cloudflare
CF-RAY
592c9212bbba650f-FRA
cf-request-id
02afb99fb10000650f7a2cf200000001
bootstrap.min.css
emailacountupdate.tk/pz/vendor/bootstrap/css/
138 KB
19 KB
Stylesheet
General
Full URL
https://emailacountupdate.tk/pz/vendor/bootstrap/css/bootstrap.min.css
Requested by
Host: emailacountupdate.tk
URL: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:726e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PleskLin
Resource Hash
7928b5ab63c6e89ee0ee26f5ef201a58c72baf91abb688580a1aa26eb57b3c11

Request headers

Referer
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 13:01:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 25 Dec 2019 01:18:58 GMT
server
cloudflare
age
4373
x-powered-by
PleskLin
etag
W/"5e02b902-22688"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=14400
cf-ray
592c921d5e93c29f-FRA
cf-request-id
02afb9a6540000c29f7bb85200000001
google.png
emailacountupdate.tk/pz/
4 KB
4 KB
Image
General
Full URL
https://emailacountupdate.tk/pz/google.png
Requested by
Host: emailacountupdate.tk
URL: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:726e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PleskLin
Resource Hash
fd4d9d732e7a4af52746ebabe6bb16941ee71ae3e919131af700cf4e1228a16a

Request headers

Referer
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 13:01:54 GMT
cf-cache-status
HIT
age
4373
x-powered-by
PleskLin
status
200
content-length
3831
cf-request-id
02afb9a6540000c29f7bb87200000001
last-modified
Wed, 25 Dec 2019 01:18:56 GMT
server
cloudflare
etag
"5e02b900-ef7"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
image/png
cache-control
max-age=14400
accept-ranges
bytes
cf-ray
592c921d5e99c29f-FRA
jquery-2.2.3.min.js
emailacountupdate.tk/pz/vendor/jquery/
84 KB
29 KB
Script
General
Full URL
https://emailacountupdate.tk/pz/vendor/jquery/jquery-2.2.3.min.js
Requested by
Host: emailacountupdate.tk
URL: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:726e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PleskLin
Resource Hash
6b6de0d4db7876d1183a3edb47ebd3bbbf93f153f5de1ba6645049348628109a

Request headers

Referer
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 13:01:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 25 Dec 2019 01:19:00 GMT
server
cloudflare
age
4373
x-powered-by
PleskLin
etag
W/"5e02b904-14e9b"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
592c921d5e95c29f-FRA
cf-request-id
02afb9a6540000c29f7bb86200000001
bootstrap.min.js
emailacountupdate.tk/pz/vendor/bootstrap/js/
50 KB
13 KB
Script
General
Full URL
https://emailacountupdate.tk/pz/vendor/bootstrap/js/bootstrap.min.js
Requested by
Host: emailacountupdate.tk
URL: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:726e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PleskLin
Resource Hash
56c12a125b021d21a69e61d7190cefa168d6c28ce715265cea1b3b0112d169c4

Request headers

Referer
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 13:01:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 25 Dec 2019 01:19:00 GMT
server
cloudflare
age
4373
x-powered-by
PleskLin
etag
W/"5e02b904-c75f"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
592c921d5e9bc29f-FRA
cf-request-id
02afb9a6540000c29f7bb88200000001
data.js
emailacountupdate.tk/pz/js/
4 KB
1 KB
Script
General
Full URL
https://emailacountupdate.tk/pz/js/data.js
Requested by
Host: emailacountupdate.tk
URL: https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3037::6818:726e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare / PleskLin
Resource Hash
38c747fada3dd2e0c87bd7d1074927c45f59312ef04c439b831c315c1ecc4b9e

Request headers

Referer
https://emailacountupdate.tk/pz/index.php?email=dan.munthe@alliancepipeline.com
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 13:01:54 GMT
content-encoding
br
cf-cache-status
HIT
last-modified
Wed, 25 Dec 2019 01:18:56 GMT
server
cloudflare
age
4373
x-powered-by
PleskLin
etag
W/"5e02b900-113a"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
max-age=14400
cf-ray
592c921d5e9dc29f-FRA
cf-request-id
02afb9a6540000c29f7bb89200000001

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery object| bootstrap number| counter object| email object| password object| showDomain string| domain function| checkMail

1 Cookies

Domain/Path Name / Value
.emailacountupdate.tk/ Name: __cfduid
Value: d9ab4670c28302f2d213b3666658c90771589374912