cornoavuirs1.webhost4life.com
Open in
urlscan Pro
66.96.146.79
Malicious Activity!
Public Scan
Submission: On January 29 via manual from IL
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on March 26th 2019. Valid for: 2 years.
This is the only time cornoavuirs1.webhost4life.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 66.96.146.79 66.96.146.79 | 29873 (BIZLAND-SD) (BIZLAND-SD) | |
6 | 2620:100:6021... 2620:100:6021:15::a27d:410f | 19679 (DROPBOX) (DROPBOX) | |
7 | 2 |
ASN29873 (BIZLAND-SD, US)
PTR: 79.146.96.66.static.eigbox.net
cornoavuirs1.webhost4life.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
dropboxusercontent.com
dl.dropboxusercontent.com |
116 KB |
1 |
webhost4life.com
cornoavuirs1.webhost4life.com |
2 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
6 | dl.dropboxusercontent.com |
cornoavuirs1.webhost4life.com
|
1 | cornoavuirs1.webhost4life.com | |
7 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
netflix.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.webhost4life.com Sectigo RSA Domain Validation Secure Server CA |
2019-03-26 - 2021-06-27 |
2 years | crt.sh |
*.dl.dropboxusercontent.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-01-19 - 2022-02-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cornoavuirs1.webhost4life.com/ionosefeermso.com-redirect/in.html
Frame ID: 81AA7B410D81D0020E2E3758329C2D21
Requests: 7 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Sign Out
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
in.html
cornoavuirs1.webhost4life.com/ionosefeermso.com-redirect/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
update.css
dl.dropboxusercontent.com/s/6gtet0badcal66o/ |
2 KB 1020 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
dl.dropboxusercontent.com/s/xbn3khqa0r1o2u7/ |
286 KB 103 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
dl.dropboxusercontent.com/s/8biov645wdo3mei/ |
23 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
dl.dropboxusercontent.com/s/dnl2mnkguvero2c/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ms.svg
dl.dropboxusercontent.com/s/7naylf2qjwhuxrw/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
visa.svg
dl.dropboxusercontent.com/s/3764lwh6zca7ij6/ |
1 KB 733 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| onLogin0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cornoavuirs1.webhost4life.com
dl.dropboxusercontent.com
2620:100:6021:15::a27d:410f
66.96.146.79
296f2e73d3cd53c59a9029938840ee60477c10ed731d2607704337f66592e04c
5069c31661d5f292883bf46fcf480947d2ed3aac5a777afadc3833c5e9861f24
689eadc080ffe1f3275074ded4a62458e628b33d07f743a39a52586d9e3ffd1f
692d421d5c163409a5918e802f507abbaa6bec90baa454c5252977a5b3b7ff0d
9a4620a32974adc5764f26a8070cd432aa32ba8be3167320fd32bcd9cdcaed08
a199620fe981df00a825f78761d3f7c8870f8117daa4a890e08018dec386dae8
c274cd78f4085746a47bcc6e57c5592c1fb6584a8ac2246bcac6fe9be4d94c13