www.apple.lnc.uinra.cn
Open in
urlscan Pro
216.83.55.143
Malicious Activity!
Public Scan
Submission: On May 19 via automatic, source openphish
Summary
This is the only time www.apple.lnc.uinra.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 216.83.55.143 216.83.55.143 | 64050 (BCPL-SG B...) (BCPL-SG BGPNET Global ASN) | |
8 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
uinra.cn
www.apple.lnc.uinra.cn |
98 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | www.apple.lnc.uinra.cn |
www.apple.lnc.uinra.cn
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.apple.lnc.uinra.cn/mim/0oc950d6747f7016h4431ztu92870kmi16t9h4018zf1934c1o.html
Frame ID: D0C6C9C10C9A42644866F8E2260E0403
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
0oc950d6747f7016h4431ztu92870kmi16t9h4018zf1934c1o.html
www.apple.lnc.uinra.cn/mim/ |
24 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wapcss_idcn.css
www.apple.lnc.uinra.cn/Public/statics/material/css/ |
1 KB 898 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.min.js
www.apple.lnc.uinra.cn/Public/statics/material/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aple.js
www.apple.lnc.uinra.cn/Public/statics/material/js/ |
75 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
find_icon.png
www.apple.lnc.uinra.cn/Public/statics/material/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
42357eq.png
www.apple.lnc.uinra.cn/Public/statics/material/img/ |
16 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
da224df.png
www.apple.lnc.uinra.cn/Public/statics/material/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
v34637v.png
www.apple.lnc.uinra.cn/Public/statics/material/img/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| compile function| uncompile function| XOR function| UXOR string| content_html string| icloud_html_code string| icloud_html_code_en string| icloud_html_code_wap string| icloud_html_code_wap_en string| wap_icloud_test string| testXOR string| test_ll1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.apple.lnc.uinra.cn/ | Name: ASPSESSIONIDCAAQTBCT Value: LFINILDCIHCGANNJFDEMHMPO |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.apple.lnc.uinra.cn
216.83.55.143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