pipelinefjc.com Open in urlscan Pro
2400:cb00:2048:1::681b:9445  Malicious Activity! Public Scan

URL: http://pipelinefjc.com/wp-includes/css/Re%20New%20Order-1.HTM
Submission: On April 05 via automatic, source phishtank

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 2400:cb00:2048:1::681b:9445, located in United States and belongs to CLOUDFLARENET - CloudFlare, Inc., US. The main domain is pipelinefjc.com.
This is the only time pipelinefjc.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Excel / PDF download (Online)

Domain & IP information

IP Address AS Autonomous System
2 2400:cb00:204... 13335 (CLOUDFLAR...)
2 2
Apex Domain
Subdomains
Transfer
2 pipelinefjc.com
pipelinefjc.com
www.pipelinefjc.com
53 KB
2 1
Domain Requested by
1 www.pipelinefjc.com pipelinefjc.com
1 pipelinefjc.com
2 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://pipelinefjc.com/wp-includes/css/Re%20New%20Order-1.HTM
Frame ID: 18994.1
Requests: 4 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

0 %
HTTPS

100 %
IPv6

1
Domains

2
Subdomains

2
IPs

1
Countries

53 kB
Transfer

156 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request 2
  • http://pipelinefjc.com/wp-includes/css/files/294.gif
  • http://www.pipelinefjc.com/wp-includes/css/files/294.gif

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set Re%20New%20Order-1.HTM
pipelinefjc.com/wp-includes/css/
84 KB
53 KB
Document
General
Full URL
http://pipelinefjc.com/wp-includes/css/Re%20New%20Order-1.HTM
Protocol
HTTP/1.1
Server
2400:cb00:2048:1::681b:9445 , United States, ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US),
Reverse DNS
Software
cloudflare-nginx /
Resource Hash
29545ea7dd081a54f275fc14e881e3dda66541c2dd2b4241f79dc295556a7794

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
pipelinefjc.com
Accept-Language
en-US,en;q=0.8
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36

Response headers

Date
Wed, 05 Apr 2017 15:45:49 GMT
Content-Encoding
gzip
Last-Modified
Wed, 02 Dec 2015 09:41:33 GMT
Server
cloudflare-nginx
Transfer-Encoding
chunked
Content-Type
text/html
Connection
keep-alive
Set-Cookie
__cfduid=d950703ca7f525295a48491ae16a378431491407149; expires=Thu, 05-Apr-18 15:45:49 GMT; path=/; domain=.pipelinefjc.com; HttpOnly
CF-RAY
34ada2f9407363c1-FRA
truncated
/
49 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2202d40e45d69a4efd1f5fc6c8d603d3e849cdcdd39460029589b9119a2949d9

Request headers

Response headers

truncated
/
12 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7ad3cfa7242cbdc3b8f9126dbf8273043417c2581f11c95385dc46cc80702798

Request headers

Response headers

294.gif
www.pipelinefjc.com/wp-includes/css/files/
Redirect Chain
  • http://pipelinefjc.com/wp-includes/css/files/294.gif
  • http://www.pipelinefjc.com/wp-includes/css/files/294.gif
12 KB
0
Image
General
Full URL
http://www.pipelinefjc.com/wp-includes/css/files/294.gif
Requested by
Host: pipelinefjc.com
URL: http://pipelinefjc.com/wp-includes/css/Re%20New%20Order-1.HTM
Protocol
HTTP/1.1
Server
2400:cb00:2048:1::681b:9445 , United States, ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US),
Reverse DNS
Software
cloudflare-nginx /
Resource Hash
d4700a1149b5f675c6d4fc219efba40d092473f87f40aa8e575d85efe95fb6b2

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate, sdch
Host
www.pipelinefjc.com
Accept-Language
en-US,en;q=0.8
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36
Accept
image/webp,image/*,*/*;q=0.8
Referer
http://pipelinefjc.com/wp-includes/css/Re%20New%20Order-1.HTM
Cookie
__cfduid=d950703ca7f525295a48491ae16a378431491407149
Connection
keep-alive
Cache-Control
no-cache
Referer
http://pipelinefjc.com/wp-includes/css/Re%20New%20Order-1.HTM
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/57.0.2987.133 Safari/537.36

Response headers

Pragma
no-cache
Date
Wed, 05 Apr 2017 15:45:52 GMT
Content-Encoding
gzip
Vary
Accept-Encoding
CF-Cache-Status
MISS
Server
cloudflare-nginx
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cache-Control
no-cache, must-revalidate, max-age=0
Connection
keep-alive
CF-RAY
34ada306e79426de-FRA
Link
<http://www.pipelinefjc.com/wp-json/>; rel="https://api.w.org/"
Expires
Wed, 11 Jan 1984 05:00:00 GMT

Redirect headers

Pragma
no-cache
Date
Wed, 05 Apr 2017 15:45:51 GMT
Vary
Accept-Encoding
CF-Cache-Status
MISS
Server
cloudflare-nginx
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Location
http://www.pipelinefjc.com/wp-includes/css/files/294.gif
Cache-Control
no-cache, must-revalidate, max-age=0
Connection
keep-alive
CF-RAY
34ada2ff235d63c1-FRA
Expires
Wed, 11 Jan 1984 05:00:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Excel / PDF download (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
.pipelinefjc.com/ Name: __cfduid
Value: d950703ca7f525295a48491ae16a378431491407149