www.netflix-offer.sys4828d.xyz
Open in
urlscan Pro
162.0.239.210
Malicious Activity!
Public Scan
Submission: On October 05 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 5th 2020. Valid for: 3 months.
This is the only time www.netflix-offer.sys4828d.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 162.0.239.210 162.0.239.210 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
5 | 2a00:86c0:209... 2a00:86c0:2090::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
7 | 2 |
ASN22612 (NAMECHEAP-NET, US)
PTR: orionis-radiotherapists.vpsrdns.web-hosting.com
www.netflix-offer.sys4828d.xyz |
ASN40027 (NETFLIX-ASN, US)
codex.nflxext.com | |
assets.nflxext.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
nflxext.com
codex.nflxext.com assets.nflxext.com |
476 KB |
2 |
sys4828d.xyz
www.netflix-offer.sys4828d.xyz |
57 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
3 | codex.nflxext.com |
www.netflix-offer.sys4828d.xyz
|
2 | assets.nflxext.com |
www.netflix-offer.sys4828d.xyz
codex.nflxext.com |
2 | www.netflix-offer.sys4828d.xyz |
www.netflix-offer.sys4828d.xyz
|
7 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
netflix-offer.sys4828d.xyz Let's Encrypt Authority X3 |
2020-10-05 - 2021-01-03 |
3 months | crt.sh |
*.1.nflxso.net DigiCert SHA2 Secure Server CA |
2020-09-20 - 2020-10-24 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.netflix-offer.sys4828d.xyz/
Frame ID: F8EDD991B614DED12B6763DA93AD518E
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
CentOS (Operating Systems) Expand
Detected patterns
- headers server /CentOS/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.netflix-offer.sys4828d.xyz/ |
57 KB 57 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none
codex.nflxext.com/%5E3.0.0/truthBundle/webui/0.0.1-shakti-js-v83299c38/js/js/bootstrap.js,common%7Cbootstrap.js/2/4M024l4k484m4A444u4L050n004N4p4w4n4G4a4v4i4y08014I12/bck/true/ |
9 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none
codex.nflxext.com/%5E3.0.0/truthBundle/webui/0.0.1-shakti-js-v83299c38/js/js/components%7Clogin%7CloginControllerClient.js/2/4M024l4k484m4A444u4L050n004N4p4w4n4G4a4v4i4y08014I12/l/true/ |
826 KB 253 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebsiteDetect
www.netflix-offer.sys4828d.xyz/personalization/cl2/freeform/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none
codex.nflxext.com/%5E3.0.0/truthBundle/webui/0.0.1-shakti-css-v83299c38/css/css/less%7Clogin%7CloginBase.less,less%7Cpages%7Clogin%7CLogin.less/1/4zJBR6AlmscIPQ/none/true/ |
161 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
US-en-20200106-popsignuptwoweeks-perspective_alpha_website_small.jpg
assets.nflxext.com/ffe/siteui/vlv3/d1f1a1dc-c017-4189-8fc2-193a3f3699b8/6cb68914-5a96-4fcf-b023-788b04a5f9c4/ |
121 KB 122 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-93.woff
assets.nflxext.com/ffe/siteui/fonts/ |
72 KB 72 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
codex.nflxext.com
www.netflix-offer.sys4828d.xyz
162.0.239.210
2a00:86c0:2090::1
1456e309f9117d9b25a5494994e88e65d28fc9d1a7f33d4c40a054b11d10e3c6
7e9fb4a1eb5c1629ff82e1648517cd5b02afc5509267317517ec8483ecf51989
93ee95475bb86d19c28b701073829e94a003cdfc4e5edadd0205cea5fd001a85
98713b53a74ebe7e326353080c5f1653e83af61d6363c0b3c4c67d6d24197b4d
be4042ee59afb851b90aee2ee2abd5451f0641964344cf8306f700d55b763bef
cf4d9e1a0c7877bda20a2f86d6a0ff6916ec3738dfd4c28805d2936bb9ba07bd