applesupporte.com
Open in
urlscan Pro
38.242.213.245
Malicious Activity!
Public Scan
Submission: On August 22 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by R3 on August 12th 2022. Valid for: 3 months.
This is the only time applesupporte.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 38.242.213.245 38.242.213.245 | 51167 (CONTABO) (CONTABO) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
8 | 2 |
ASN51167 (CONTABO, DE)
PTR: vmi823195.contaboserver.net
applesupporte.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
applesupporte.com
applesupporte.com |
48 KB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 615 |
201 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
6 | applesupporte.com |
applesupporte.com
|
2 | code.jquery.com |
applesupporte.com
|
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
iforgot.apple.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
applesupporte.com R3 |
2022-08-12 - 2022-11-10 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://applesupporte.com/BjE8q
Frame ID: 80CBB490E7D180717D1F7BD4D599F214
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
FMlDetected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)/jquery-ui(?:\.min)?\.js
- jquery-ui.*\.js
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Unlock Account
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
BjE8q
applesupporte.com/ |
14 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.10.2.js
applesupporte.com/passcode6/js/ |
84 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
passcode.css
applesupporte.com/passcode6/css/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
passcode.js
applesupporte.com/passcode6/js/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.10.2.js
code.jquery.com/ |
267 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.js
code.jquery.com/ui/1.12.1/ |
509 KB 122 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
activity-indicator.js
applesupporte.com/passcode6/js/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
next.png
applesupporte.com/passcode6/img/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery object| Geos number| setcolor number| num number| afis function| remove function| changePolyColor function| login1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
applesupporte.com/ | Name: PHPSESSID Value: 6d8d6h6dn8a3nrejakrk1jueq2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
applesupporte.com
code.jquery.com
2001:4de0:ac18::1:a:2b
38.242.213.245
439f4ed5d5616cdc024227e4985d64d47079599a94b79ec2565f25e6342aead6
4f455eb2ddf2094ee969f470f6bfac7adb4c057e8990a374e9da819e943c777d
633ba16fa4ae95cc60b2a7dd1dceff0a235d31edc5340e6249ee9c0fcd96d0c8
8ade6740a1d3cfedf81e28d9250929341207b23a55f1be90ccc26cf6d98e052a
9043b20ba471232c4ea62ee23dbe1d499db2da6df7aa733d7396d0d94b8bec67
d59063b5809dcbb67034d9016e2d69bb9cfdff70200611c247cb3d5818fc8f8e
dfd06ad51919f8e1ef0e9629121ee74d2cb73c3068bf6336cae10bdd1e262aa8
fa9dcfe37df0132504fdb3ed8632df800b64023daa5f7fc1338f1ee0126f7b15