rijorajan711.github.io
Open in
urlscan Pro
2606:50c0:8003::153
Malicious Activity!
Public Scan
Effective URL: https://rijorajan711.github.io/netflix-clone-/
Submission: On February 03 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by DigiCert TLS RSA SHA256 2020 CA1 on February 21st 2023. Valid for: a year.
This is the only time rijorajan711.github.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:50c0:800... 2606:50c0:8001::153 | 54113 (FASTLY) (FASTLY) | |
1 3 | 2606:50c0:800... 2606:50c0:8003::153 | 54113 (FASTLY) (FASTLY) | |
6 | 2a00:86c0:209... 2a00:86c0:2090::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
1 | 2405:200:160f... 2405:200:160f:600:49:44:142:a6 | 55836 (RELIANCEJ...) (RELIANCEJIO-IN Reliance Jio Infocomm Limited) | |
9 | 3 |
ASN55836 (RELIANCEJIO-IN Reliance Jio Infocomm Limited, IN)
occ-0-4994-2186.1.nflxso.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
nflxext.com
assets.nflxext.com — Cisco Umbrella Rank: 5604 |
370 KB |
4 |
github.io
2 redirects
rijorajan711.github.io |
6 KB |
1 |
nflxso.net
occ-0-4994-2186.1.nflxso.net |
263 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
6 | assets.nflxext.com |
rijorajan711.github.io
|
4 | rijorajan711.github.io |
2 redirects
rijorajan711.github.io
|
1 | occ-0-4994-2186.1.nflxso.net |
rijorajan711.github.io
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
help.netflix.com |
www.netflix.com |
media.netflix.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.github.io DigiCert TLS RSA SHA256 2020 CA1 |
2023-02-21 - 2024-03-20 |
a year | crt.sh |
*.1.nflxso.net DigiCert Secure Site ECC CA-1 |
2024-01-09 - 2024-02-11 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://rijorajan711.github.io/netflix-clone-/
Frame ID: 788CF8CD1CEA96D976308C7709F0DB0D
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
NetFlixPage URL History Show full URLs
-
http://rijorajan711.github.io/netflix-clone-
HTTP 301
https://rijorajan711.github.io/netflix-clone- HTTP 301
https://rijorajan711.github.io/netflix-clone-/ Page URL
Detected technologies
GitHub Pages (CDN) ExpandDetected patterns
- ^https?://[^/]+\.github\.io
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: FAQ
Search URL Search Domain Scan URL
Title: Account
Search URL Search Domain Scan URL
Title: Media center
Search URL Search Domain Scan URL
Title: Help center
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://rijorajan711.github.io/netflix-clone-
HTTP 301
https://rijorajan711.github.io/netflix-clone- HTTP 301
https://rijorajan711.github.io/netflix-clone-/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
rijorajan711.github.io/netflix-clone-/ Redirect Chain
|
12 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
netflix.css
rijorajan711.github.io/netflix-clone-/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IN-en-20221010-popsignuptwoweeks-perspective_alpha_website_large.jpg
assets.nflxext.com/ffe/siteui/vlv3/28b69a57-cadf-43d9-8a95-e5f2e11199de/a678bf27-dbb6-42e7-aad1-d4dbb1c31d7b/ |
304 KB 304 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tv.png
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
AAAABYjXrxZKtrzxQRVQNn2aIByoomnlbXmJ-uBy7du8a5Si3xqIsgerTlwJZG1vMpqer2kvcILy0UJQnjfRUQ5cEr7gQlYqXfxUg7bz.png
occ-0-4994-2186.1.nflxso.net/dnm/api/v6/19OhWN2dO19C9txTON9tvTFtefw/ |
263 KB 263 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mobile-0819.jpg
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
48 KB 49 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
video-tv-in-0819.m4v
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
63 KB 0 |
Media
video/x-m4v |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
video-tv-in-0819.m4v
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
5 KB 6 KB |
Media
video/x-m4v |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
video-tv-in-0819.m4v
assets.nflxext.com/ffe/siteui/acquisition/ourStory/fuji/desktop/ |
229 KB 0 |
Media
video/x-m4v |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556952 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
occ-0-4994-2186.1.nflxso.net
rijorajan711.github.io
2405:200:160f:600:49:44:142:a6
2606:50c0:8001::153
2606:50c0:8003::153
2a00:86c0:2090::1
23360b555c7878690f9abf18d686a9c0c84dec5737dee51c1dcff7064f3378d3
492fdebd363e40cbba153a244bcfe2a7f5f7cf20aff0805fe45d5c7e2180b875
6b0ed1e5929282bbcc0a27f1405bad6f3606b81ff133614feed11dc5d588ffd4
87c71d9108c7ead2c27f80bc5e874f9292f8aa8b657fa9bee6835bddf758cdb8
885eb1e807834ab34d456da583c6ee223ace0609de005de2cf6a1ffb6c854193
b68ea2c7bea397aa11fadb189ce7d83862baebaf03ece643eb5aa9fb5f755056
c1209839e2e5447960eea50aa10d565a1d0a84026fdc6fe73388695c2b17c8fe