verizon.reviewaccountinfo.co
Open in
urlscan Pro
45.88.3.135
Malicious Activity!
Public Scan
Effective URL: https://verizon.reviewaccountinfo.co/
Submission: On April 26 via api from US
Summary
TLS certificate: Issued by R3 on April 25th 2021. Valid for: 3 months.
This is the only time verizon.reviewaccountinfo.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Verizon (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 52.72.49.79 52.72.49.79 | 14618 (AMAZON-AES) (AMAZON-AES) | |
15 | 45.88.3.135 45.88.3.135 | 200313 (INTERNET-IT) (INTERNET-IT) | |
4 | 68.232.35.163 68.232.35.163 | 15133 (EDGECAST) (EDGECAST) | |
19 | 3 |
ASN14618 (AMAZON-AES, US)
PTR: visit.rebrand.ly
checkaccdetail.com |
ASN200313 (INTERNET-IT, SC)
PTR: traefok.xyz
verizon.reviewaccountinfo.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
reviewaccountinfo.co
verizon.reviewaccountinfo.co |
306 KB |
4 |
vzw.com
scache1.vzw.com scache2.vzw.com |
135 KB |
1 |
checkaccdetail.com
1 redirects
checkaccdetail.com |
290 B |
19 | 3 |
Domain | Requested by | |
---|---|---|
15 | verizon.reviewaccountinfo.co |
verizon.reviewaccountinfo.co
|
2 | scache2.vzw.com |
verizon.reviewaccountinfo.co
|
2 | scache1.vzw.com |
verizon.reviewaccountinfo.co
|
1 | checkaccdetail.com | 1 redirects |
19 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
verizon.reviewaccountinfo.co R3 |
2021-04-25 - 2021-07-24 |
3 months | crt.sh |
www.vzw.com DigiCert Baltimore CA-2 G2 |
2019-12-09 - 2021-12-13 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://verizon.reviewaccountinfo.co/
Frame ID: BA435B88D5144EC372FFC13171E56218
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://checkaccdetail.com/verizon
HTTP 301
https://verizon.reviewaccountinfo.co/ Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- script /bootstrap[.-]([\d.]*\d)[^/]*\.js/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://checkaccdetail.com/verizon
HTTP 301
https://verizon.reviewaccountinfo.co/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
verizon.reviewaccountinfo.co/ Redirect Chain
|
244 KB 24 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-3.3.7.min.css
verizon.reviewaccountinfo.co/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
less-space.css
verizon.reviewaccountinfo.co/css/ |
20 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style-2.0.css
verizon.reviewaccountinfo.co/css/ |
33 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.12.4.min.js
verizon.reviewaccountinfo.co/js/ |
95 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core.css
verizon.reviewaccountinfo.co/css/ |
125 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap-3.3.7.min.js
verizon.reviewaccountinfo.co/js/ |
36 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginEntry.css
verizon.reviewaccountinfo.co/css/ |
21 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zenkeyLogin.css
verizon.reviewaccountinfo.co/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
VZ-White.svg
verizon.reviewaccountinfo.co/img/ |
8 KB 8 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
asterisk_icon.svg
verizon.reviewaccountinfo.co/img/ |
571 B 827 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VerizonNHGeDS-Regular.woff2
scache1.vzw.com/globalnav/fonts/verizon-nhg/ |
35 KB 35 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VerizonNHGeTX-Bold.woff2
scache2.vzw.com/globalnav/fonts/verizon-nhg/ |
32 KB 32 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VerizonNHGeTX-Regular.woff2
scache1.vzw.com/globalnav/fonts/verizon-nhg/ |
31 KB 31 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
VerizonNHGeDS-Bold.woff2
scache2.vzw.com/globalnav/fonts/verizon-nhg/ |
37 KB 37 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NHaasGroteskDSW02-75Bd.woff2
verizon.reviewaccountinfo.co/css/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NeueHaasGroteskText55Roman.woff
verizon.reviewaccountinfo.co/css/ |
43 KB 44 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 13 KB |
Font
application/x-font-ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
VerizonNHGDS-Regular.otf
verizon.reviewaccountinfo.co/css/ |
49 KB 49 KB |
Font
application/font-sfnt |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
250 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NHaasGroteskDSW02-75Bd.woff
verizon.reviewaccountinfo.co/css/ |
79 KB 79 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Verizon (Telecommunication)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| jQuery1124087810415590605011 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
verizon.reviewaccountinfo.co/ | Name: PHPSESSID Value: ueak3bqbo7sthgevo4oj5t5u41 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
checkaccdetail.com
scache1.vzw.com
scache2.vzw.com
verizon.reviewaccountinfo.co
45.88.3.135
52.72.49.79
68.232.35.163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