185.234.216.211
Open in
urlscan Pro
185.234.216.211
Malicious Activity!
Public Scan
Submission: On April 10 via automatic, source openphish
Summary
This is the only time 185.234.216.211 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 185.234.216.211 185.234.216.211 | 197226 (SPRINT-SDC) (SPRINT-SDC) | |
2 | 94.31.29.54 94.31.29.54 | 54104 (AS-STACKPATH) (AS-STACKPATH - netDNA) | |
1 | 64.13.192.166 64.13.192.166 | 31815 (MEDIATEMPLE) (MEDIATEMPLE - Media Temple) | |
1 | 52.212.136.196 52.212.136.196 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 | 52.209.236.203 52.209.236.203 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
12 | 6 |
ASN54104 (AS-STACKPATH - netDNA, US)
PTR: 94.31.29.54.IPYX-077437-ZYO.above.net
code.jquery.com |
ASN31815 (MEDIATEMPLE - Media Temple, Inc., US)
PTR: acmkokeaac.gs01.gridserver.com
swip.codylindley.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-52-212-136-196.eu-west-1.compute.amazonaws.com
www.netflix.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-52-209-236-203.eu-west-1.compute.amazonaws.com
www.netflix.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
netflix.com
www.netflix.com Failed |
3 KB |
2 |
jquery.com
code.jquery.com |
42 KB |
1 |
codylindley.com
swip.codylindley.com |
3 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
2 | www.netflix.com |
185.234.216.211
|
2 | code.jquery.com |
185.234.216.211
|
1 | swip.codylindley.com |
185.234.216.211
|
12 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://185.234.216.211/netbill/Login.php?sslchannel=true&sessionid=4wceHNNwF399OJSQlPXGYvSBIym2rKJ11ZlytpsNc2SrL2rZXVZLVshVPlP6qxbbNdmJXukSNmMIu04GMuvA54wtxblZEvujc2SokDYb6lAIqmgWytk5Ex8dlB4CgRiV9J
Frame ID: EE9D38DD9FDB394D50918630FD2A73AB
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
- headers server /php\/?([\d.]+)?/i
Windows Server (Operating Systems) Expand
Detected patterns
- headers server /Win32|Win64/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
Login.php
185.234.216.211/netbill/ |
40 KB 40 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.0.min.js
code.jquery.com/ |
94 KB 39 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-migrate-1.2.1.min.js
code.jquery.com/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.popupWindow.js
swip.codylindley.com/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none.css
185.234.216.211/netbill/css/ |
120 KB 121 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
WebsiteDetect
www.netflix.com/ichnaea/cl2/freeform/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fb.png
185.234.216.211/netbill/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
WebsiteDetect
www.netflix.com/ichnaea/cl2/freeform/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebsiteDetect
www.netflix.com/ichnaea/cl2/freeform/ |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
WebsiteScreen
www.netflix.com/ichnaea/cl2/freeform/ |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
crown.jpg
185.234.216.211/netbill/img/ |
84 KB 85 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
one.woff
185.234.216.211/netbill/fonts/ |
69 KB 69 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.netflix.com
- URL
- https://www.netflix.com/ichnaea/cl2/freeform/WebsiteDetect?source=wwwhead&fetchType=css&modalView=login
- Domain
- www.netflix.com
- URL
- https://www.netflix.com/ichnaea/cl2/freeform/WebsiteDetect?source=wwwhead&fetchType=css&modalView=login
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| IsEmpty function| ShowPassOpt1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
185.234.216.211/ | Name: PHPSESSID Value: lrs4pp3kukc38levnpaohvdhrc |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
swip.codylindley.com
www.netflix.com
www.netflix.com
185.234.216.211
52.209.236.203
52.212.136.196
64.13.192.166
94.31.29.54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