longtail.info
Open in
urlscan Pro
207.244.252.235
Malicious Activity!
Public Scan
Submission Tags: tweet @atomspam #phishing #chase #infosec #cybersecurity #atomspam Search All
Submission: On April 04 via api from FI — Scanned from FI
Summary
This is the only time longtail.info was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 207.244.252.235 207.244.252.235 | 40021 (CONTABO) (CONTABO) | |
10 | 1 |
ASN40021 (CONTABO, US)
PTR: vmi860238.contaboserver.net
longtail.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
longtail.info
longtail.info |
1 MB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | longtail.info |
longtail.info
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://longtail.info/cm/chaseonline/0793d8f8e/7a07?8c1c0=
Frame ID: 9ECE72DC94DA65D7FB35A52D626BE99C
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
7a07
longtail.info/cm/chaseonline/0793d8f8e/ |
17 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blue-ui.css
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
493 KB 494 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fonto.css
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
1 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logon.css
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
177 KB 177 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wordmark-white.svg
longtail.info/cm/chaseonline/0793d8f8e/style/img/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.desktop.day.4.jpeg
longtail.info/cm/chaseonline/0793d8f8e/style/img/ |
299 KB 299 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opensans-regular.woff
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dcefont.woff
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
69 KB 69 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opensans-bold.woff
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
14 KB 14 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
opensans-semibold.woff
longtail.info/cm/chaseonline/0793d8f8e/style/css/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| acticheck function| togtoken function| load function| stopload function| disperr function| clrerr function| writerr function| validate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
longtail.info/ | Name: PHPSESSID Value: 83bd49024e1f1f9ce0c24304b8e6178f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
longtail.info
207.244.252.235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