satyatrimurtulubommadi.github.io
Open in
urlscan Pro
2606:50c0:8003::153
Malicious Activity!
Public Scan
Submission: On November 23 via api from US — Scanned from US
Summary
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on February 21st 2023. Valid for: a year.
This is the only time satyatrimurtulubommadi.github.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2606:50c0:800... 2606:50c0:8003::153 | 54113 (FASTLY) (FASTLY) | |
4 | 2a00:86c0:209... 2a00:86c0:2091::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
1 | 2404:a800:0:2... 2404:a800:0:29::401 | 9498 (BBIL-AP B...) (BBIL-AP BHARTI Airtel Ltd.) | |
9 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
nflxext.com
assets.nflxext.com — Cisco Umbrella Rank: 5083 |
517 KB |
4 |
github.io
satyatrimurtulubommadi.github.io |
43 KB |
1 |
nflxso.net
occ-0-3215-3662.1.nflxso.net |
249 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
4 | assets.nflxext.com |
satyatrimurtulubommadi.github.io
|
4 | satyatrimurtulubommadi.github.io |
satyatrimurtulubommadi.github.io
|
1 | occ-0-3215-3662.1.nflxso.net |
satyatrimurtulubommadi.github.io
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.github.io DigiCert TLS RSA SHA256 2020 CA1 |
2023-02-21 - 2024-03-20 |
a year | crt.sh |
*.1.nflxso.net DigiCert Secure Site ECC CA-1 |
2023-11-19 - 2023-12-19 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://satyatrimurtulubommadi.github.io/netflixwebsite/
Frame ID: 1C657D2524C19F2D7FC5D109D8F6C48D
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
DocumentDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
GitHub Pages (CDN) Expand
Detected patterns
- ^https?://[^/]+\.github\.io
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
satyatrimurtulubommadi.github.io/netflixwebsite/ |
12 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
satyatrimurtulubommadi.github.io/netflixwebsite/ |
1 KB 780 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
satyatrimurtulubommadi.github.io/netflixwebsite/css/ |
152 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
satyatrimurtulubommadi.github.io/netflixwebsite/js/ |
59 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tv.png
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile-0819.jpg
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
48 KB 49 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
device-pile-in.png
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
148 KB 148 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
AAAABVr8nYuAg0xDpXDv0VI9HUoH7r2aGp4TKRCsKNQrMwxzTtr-NlwOHeS8bCI2oeZddmu3nMYr3j9MjYhHyjBASb1FaOGYZNYvPBCL.png
occ-0-3215-3662.1.nflxso.net/dnm/api/v6/19OhWN2dO19C9txTON9tvTFtefw/ |
249 KB 249 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IN-en-20231016-popsignuptwoweeks-perspective_alpha_website_large.jpg
assets.nflxext.com/ffe/siteui/vlv3/a73c4363-1dcd-4719-b3b1-3725418fd91d/fe1147dd-78be-44aa-a0e5-2d2994305a13/ |
308 KB 308 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
231 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
231 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture number| uidEvent object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556952 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
occ-0-3215-3662.1.nflxso.net
satyatrimurtulubommadi.github.io
2404:a800:0:29::401
2606:50c0:8003::153
2a00:86c0:2091::1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