ssl.tokenvalidate.com Open in urlscan Pro
13.236.53.50  Malicious Activity! Public Scan

URL: http://ssl.tokenvalidate.com/
Submission: On May 19 via api from BE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 13.236.53.50, located in Sydney, Australia and belongs to AMAZON-02, US. The main domain is ssl.tokenvalidate.com.
This is the only time ssl.tokenvalidate.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Phishing Simulation (Internet)

Domain & IP information

IP Address AS Autonomous System
5 13.236.53.50 16509 (AMAZON-02)
5 1
Apex Domain
Subdomains
Transfer
5 tokenvalidate.com
ssl.tokenvalidate.com
197 KB
5 1
Domain Requested by
5 ssl.tokenvalidate.com ssl.tokenvalidate.com
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://ssl.tokenvalidate.com/
Frame ID: 09965D9DBB47614F7DFF72AA2922BF6A
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

197 kB
Transfer

195 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
ssl.tokenvalidate.com/
3 KB
4 KB
Document
General
Full URL
http://ssl.tokenvalidate.com/
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
351fae9836bfd71f1400ae73590a88a085ec3ed6286184ffb81793c8f0c27a6d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Host
ssl.tokenvalidate.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 19 May 2020 17:24:57 GMT
Server
Apache
Cache-Control
no-cache, no-store
Referrer-Policy
strict-origin-when-cross-origin
X-Permitted-Cross-Domain-Policies
none
Pragma
no-cache
X-XSS-Protection
1; mode=block
X-Request-Id
ab23766a-5bfa-4fbd-8ae0-bda2175e7e0b
X-Download-Options
noopen noopen
X-Runtime
0.003823
X-Frame-Options
DENY
X-Content-Type-Options
nosniff
Expires
Fri, 01 Jan 1990 00:00:00 GMT
Status
404 Not Found
Access-Control-Allow-Origin
http://landing.phishme.com.au
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=utf-8
phishme_spear_phishing_quick_tip_title.png
ssl.tokenvalidate.com/images/www/
87 KB
87 KB
Image
General
Full URL
http://ssl.tokenvalidate.com/images/www/phishme_spear_phishing_quick_tip_title.png
Requested by
Host: ssl.tokenvalidate.com
URL: http://ssl.tokenvalidate.com/
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
8079376a80d57cf462aad98f4d21542871852b4f4edc5fe3db2f2f1839fdc87d

Request headers

Referer
http://ssl.tokenvalidate.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 19 May 2020 17:24:57 GMT
Last-Modified
Mon, 18 May 2020 18:06:12 GMT
Server
Apache
ETag
"15b42-5a5f004a1cd00"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
88898
Expires
Tue, 19 May 2020 17:24:57 GMT
phishme_spear_phishing_quick_tip.png
ssl.tokenvalidate.com/images/www/
93 KB
93 KB
Image
General
Full URL
http://ssl.tokenvalidate.com/images/www/phishme_spear_phishing_quick_tip.png
Requested by
Host: ssl.tokenvalidate.com
URL: http://ssl.tokenvalidate.com/
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
e106b2b8a45566462a60cecbe4e8f8c1ffb287e40222b1db28fc46e7da43766d

Request headers

Referer
http://ssl.tokenvalidate.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 19 May 2020 17:24:57 GMT
Last-Modified
Mon, 18 May 2020 18:06:12 GMT
Server
Apache
ETag
"17261-5a5f004a1cd00"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
94817
Expires
Tue, 19 May 2020 17:24:57 GMT
reporter.png
ssl.tokenvalidate.com/images/www/
12 KB
12 KB
Image
General
Full URL
http://ssl.tokenvalidate.com/images/www/reporter.png
Requested by
Host: ssl.tokenvalidate.com
URL: http://ssl.tokenvalidate.com/
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
b66912ec278b45ce43a38e270d8f94f39296787dd3857274002951d7b773761a

Request headers

Referer
http://ssl.tokenvalidate.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 19 May 2020 17:24:57 GMT
Last-Modified
Mon, 18 May 2020 18:06:12 GMT
Server
Apache
ETag
"3016-5a5f004a1cd00"
X-Download-Options
noopen
Content-Type
image/png
Access-Control-Allow-Origin
http://landing.phishme.com.au
Cache-Control
max-age=0
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
12310
Expires
Tue, 19 May 2020 17:24:57 GMT
Cofense_spear_phishing_quick_tip_ground.png
ssl.tokenvalidate.com/images/www/
0
664 B
Image
General
Full URL
http://ssl.tokenvalidate.com/images/www/Cofense_spear_phishing_quick_tip_ground.png
Requested by
Host: ssl.tokenvalidate.com
URL: http://ssl.tokenvalidate.com/
Protocol
HTTP/1.1
Server
13.236.53.50 Sydney, Australia, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-13-236-53-50.ap-southeast-2.compute.amazonaws.com
Software
Apache /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Referer
http://ssl.tokenvalidate.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 19 May 2020 17:24:57 GMT
X-Content-Type-Options
nosniff
X-Permitted-Cross-Domain-Policies
none
Access-Control-Allow-Origin
http://landing.phishme.com.au
Status
404 Not Found
Connection
Keep-Alive
Content-Length
0
X-XSS-Protection
1; mode=block
X-Request-Id
b4138dba-d923-4d26-9af9-530fe77b7d13
X-Runtime
0.004718
Referrer-Policy
strict-origin-when-cross-origin
Server
Apache
X-Download-Options
noopen, noopen
X-Frame-Options
DENY
Content-Type
image/png
Pragma
no-cache
Cache-Control
no-cache, no-store
Keep-Alive
timeout=5, max=100
Expires
Fri, 01 Jan 1990 00:00:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Phishing Simulation (Internet)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block