1account-billing.support Open in urlscan Pro
23.229.211.137  Malicious Activity! Public Scan

URL: http://1account-billing.support/
Submission: On February 02 via api from DE

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 10 HTTP transactions. The main IP is 23.229.211.137, located in Scottsdale, United States and belongs to AS-26496-GO-DADDY-COM-LLC, US. The main domain is 1account-billing.support.
This is the only time 1account-billing.support was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Netflix (Online)

Domain & IP information

IP Address AS Autonomous System
7 23.229.211.137 26496 (AS-26496-...)
3 2a00:86c0:209... 40027 (NETFLIX-ASN)
10 2
Apex Domain
Subdomains
Transfer
7 1account-billing.support
1account-billing.support
93 KB
3 nflxext.com
assets.nflxext.com
155 KB
10 2
Domain Requested by
7 1account-billing.support 1account-billing.support
3 assets.nflxext.com 1account-billing.support
10 2

This site contains no links.

Subject Issuer Validity Valid
*.1.nflxso.net
DigiCert SHA2 Secure Server CA
2020-01-21 -
2020-02-25
a month crt.sh

This page contains 1 frames:

Primary Page: http://1account-billing.support/
Frame ID: E24B0B2679CAE178C88AEE914BACA01F
Requests: 10 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • html /<[^>]+data-react/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

10
Requests

30 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

249 kB
Transfer

542 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
1account-billing.support/
53 KB
17 KB
Document
General
Full URL
http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache / PHP/7.2.20
Resource Hash
04023aac28223e606a95d730fd72b408524664c6e0fe16d7926d0c6715e671dd

Request headers

Host
1account-billing.support
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:11 GMT
Server
Apache
X-Powered-By
PHP/7.2.20
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip
Content-Length
17601
Keep-Alive
timeout=5
Content-Type
text/html; charset=UTF-8
css_1.css
1account-billing.support/css/
101 KB
17 KB
Stylesheet
General
Full URL
http://1account-billing.support/css/css_1.css
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache /
Resource Hash
fce8bcdd1b0070562494f5fe8483e9447fa892959bcca2741fae6e5a9402222b

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:11 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 Nov 2017 06:38:50 GMT
Server
Apache
ETag
"7b402cc-193c0-55e8c92825280-gzip"
Vary
Accept-Encoding,User-Agent
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
text/css
Keep-Alive
timeout=5
Content-Length
16808
css_2.css
1account-billing.support/css/
127 KB
21 KB
Stylesheet
General
Full URL
http://1account-billing.support/css/css_2.css
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache /
Resource Hash
14e90a33a528f27f5445a17fa9bf2e48cd6db1f37884bfd72c04afc47404821b

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 Nov 2017 06:38:50 GMT
Server
Apache
ETag
"7b402ce-1fa4c-55e8c92825280-gzip"
Vary
Accept-Encoding,User-Agent
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
text/css
Keep-Alive
timeout=5
Content-Length
20883
main.css
1account-billing.support/css/
1 KB
947 B
Stylesheet
General
Full URL
http://1account-billing.support/css/main.css
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache /
Resource Hash
73d7a671c117c0175acc3af1a17f2ffa78caa0b5dd37ea23cd30d4c857d1e132

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 Nov 2017 06:38:50 GMT
Server
Apache
ETag
"7b402c9-5e3-55e8c92825280-gzip"
Vary
Accept-Encoding,User-Agent
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
text/css
Keep-Alive
timeout=5
Content-Length
591
jquery-1.11.3.min.js
1account-billing.support/js/
94 KB
33 KB
Script
General
Full URL
http://1account-billing.support/js/jquery-1.11.3.min.js
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache /
Resource Hash
20e11ce61890c08c0529911822233c9023ebc367df6c1050dec105e2b9628104

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 Nov 2017 06:38:50 GMT
Server
Apache
ETag
"7b402d2-176da-55e8c92825280-gzip"
Vary
Accept-Encoding,User-Agent
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5
Content-Length
33289
jquery.mask.min.js
1account-billing.support/js/
8 KB
4 KB
Script
General
Full URL
http://1account-billing.support/js/jquery.mask.min.js
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache /
Resource Hash
ba5186caca524a2e96e4a81384e88ac0d81b180766f8847bcd7e8598fd9fdc98

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 Nov 2017 06:38:50 GMT
Server
Apache
ETag
"7b402d7-1f36-55e8c92825280-gzip"
Vary
Accept-Encoding,User-Agent
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5
Content-Length
3358
main.js
1account-billing.support/js/
4 KB
935 B
Script
General
Full URL
http://1account-billing.support/js/main.js
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Server
23.229.211.137 Scottsdale, United States, ASN26496 (AS-26496-GO-DADDY-COM-LLC, US),
Reverse DNS
ip-23-229-211-137.ip.secureserver.net
Software
Apache /
Resource Hash
ac978c6ea7ba131b16e8324828bfa250593b9b6aed4fe8c43d3db80a2f0983e2

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Content-Encoding
gzip
Last-Modified
Wed, 22 Nov 2017 06:38:50 GMT
Server
Apache
ETag
"7b402d5-e8c-55e8c92825280-gzip"
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5
Content-Length
591
FB-f-Logo__blue_57.png
assets.nflxext.com/ffe/siteui/login/images/
1 KB
2 KB
Image
General
Full URL
https://assets.nflxext.com/ffe/siteui/login/images/FB-f-Logo__blue_57.png
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:86c0:2090::1 , United Kingdom, ASN40027 (NETFLIX-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
3e49d9dc43267590184389ab3da0cb9f7308c9c848667dab109a0f7c73450ece

Request headers

Referer
http://1account-billing.support/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:11 GMT
Last-Modified
Thu, 30 Jun 2016 17:48:49 GMT
Server
nginx
Content-MD5
ozykfvEQtuPsUIa4d2QH0w==
Content-Type
image/png
Cache-Control
public, max-age=15272973
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1455
Expires
Wed, 15 Apr 2020 20:00:00 GMT
login-the-crown_2-1500x1000.jpg
assets.nflxext.com/ffe/siteui/acquisition/login/
84 KB
85 KB
Image
General
Full URL
https://assets.nflxext.com/ffe/siteui/acquisition/login/login-the-crown_2-1500x1000.jpg
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/js/jquery-1.11.3.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:86c0:2090::1 , United Kingdom, ASN40027 (NETFLIX-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
baafd74a4cb4dc594b614eeb45c7267bb1af729d9271752460348ece16532d04

Request headers

Referer
http://1account-billing.support/css/css_1.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Last-Modified
Mon, 24 Oct 2016 20:49:51 GMT
Server
nginx
Content-MD5
5GY/BZWwL7HDlH/B8V64Eg==
Content-Type
image/jpeg
Cache-Control
public, max-age=15093806
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
86226
Expires
Wed, 15 Apr 2020 20:00:00 GMT
nf-icon-v1-88.woff
assets.nflxext.com/ffe/siteui/fonts/
69 KB
69 KB
Font
General
Full URL
https://assets.nflxext.com/ffe/siteui/fonts/nf-icon-v1-88.woff
Requested by
Host: 1account-billing.support
URL: http://1account-billing.support/js/jquery-1.11.3.min.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:86c0:2090::1 , United Kingdom, ASN40027 (NETFLIX-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
ba892f7903e737d06c952be4ed3266746ed5e1090377fbc5d2ac975626c4533a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Referer
http://1account-billing.support/css/css_1.css
Origin
http://1account-billing.support

Response headers

Date
Sun, 02 Feb 2020 04:02:12 GMT
Last-Modified
Fri, 27 Jan 2017 22:53:52 GMT
Server
nginx
Content-MD5
ezBCotj2o1GiKPEVK1YDAg==
Content-Type
font/woff
Access-Control-Allow-Origin
*
Cache-Control
public, max-age=16738792
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
70204
Expires
Wed, 15 Apr 2020 20:00:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Netflix (Online)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery object| $jscomp

0 Cookies