icioud-sign.com
Open in
urlscan Pro
2606:4700:3031::681f:5083
Malicious Activity!
Public Scan
Submission Tags: @phishunt_io
Submission: On October 20 via api from ES
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on October 19th 2020. Valid for: a year.
This is the only time icioud-sign.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2606:4700:303... 2606:4700:3031::681f:5083 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
icioud-sign.com
icioud-sign.com |
39 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | icioud-sign.com |
icioud-sign.com
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-19 - 2021-10-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://icioud-sign.com/
Frame ID: FE1312628E05410A24FCCB941206F5D0
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
icioud-sign.com/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iCloud_logo_iPhone_177x44.png
icioud-sign.com/assets/img/icloudwelcom/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_settings_iPhone_33x33.png
icioud-sign.com/assets/img/icloudwelcom/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_fmip_iPhone_33x33.png
icioud-sign.com/assets/img/icloudwelcom/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_fmf_iPhone_33x33.png
icioud-sign.com/assets/img/icloudwelcom/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
apple_logo_13x15@2x.png
icioud-sign.com/assets/img/icloudwelcom/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
HelveticaNeue-Light.woff
icioud-sign.com/fonts/ |
1 KB 476 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
HelveticaNeue-Medium.woff
icioud-sign.com/fonts/ |
1 KB 576 B |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
icioud-sign.com/ | Name: ci_sessions Value: 19173c5d4de2f1667e3bccfcc667bdc2cb7f242c |
|
.icioud-sign.com/ | Name: __cfduid Value: d7297c8561a1ab75eff74a968313c978d1603189219 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
icioud-sign.com
2606:4700:3031::681f:5083
0a852693ea729b68ab32e43e67ce7a2c49916694f97a68d24a6efd51cd956675
1731b8f933f9125b8a2311085e3a6c71a4bbceac83d4eb0a790199368d9a204d
3dba30fb0ecbe5b84dbd9c13d8edf926bd5f6bad87256764903021f31d76a1cd
4495864605527bc7a0b00931f1aba3d909a5289cdef8efb5f1d416ad05c94188
b0c0026b0392414ec461061922dd321031e1fed58e9e4d516ce41283fe0d3096
f6a5bd0f194b485b77d11bcae4b3ece41a276d6b7fadea31f4e52b69638d8d64
f9a41eabac5e4108f36600bf963124b2a12097157b38f35e784be7d2edf13df7