netflix-discount.com
Open in
urlscan Pro
2606:4700:30::6812:21e8
Malicious Activity!
Public Scan
Submission: On October 17 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on October 17th 2018. Valid for: a year.
This is the only time netflix-discount.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2606:4700:30:... 2606:4700:30::6812:21e8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
4 | 2a02:26f0:6c0... 2a02:26f0:6c00:297::33c4 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a01:578:3::3... 2a01:578:3::36ab:de23 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 | 2a01:578:3::3... 2a01:578:3::3433:b30e | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
10 | 4 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
netflix-discount.com |
ASN20940 (AKAMAI-ASN1, US)
codex.nflxext.com | |
assets.nflxext.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
nflxext.com
codex.nflxext.com assets.nflxext.com |
333 KB |
4 |
netflix-discount.com
netflix-discount.com |
73 KB |
2 |
netflix.com
www.netflix.com |
2 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
4 | netflix-discount.com |
netflix-discount.com
codex.nflxext.com |
3 | codex.nflxext.com |
netflix-discount.com
|
2 | www.netflix.com |
codex.nflxext.com
|
1 | assets.nflxext.com |
netflix-discount.com
|
10 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
help.netflix.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2018-10-17 - 2019-10-17 |
a year | crt.sh |
assets.nflxext.com DigiCert SHA2 Secure Server CA |
2018-03-09 - 2020-03-09 |
2 years | crt.sh |
www.netflix.com DigiCert SHA2 Secure Server CA |
2018-02-07 - 2020-02-07 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://netflix-discount.com/
Frame ID: 3F7C734EA6C4FCEDC83D4D56D25052C6
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
React (JavaScript Frameworks) ExpandDetected patterns
- html /<[^>]+data-react/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /cloudflare/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
6 Outgoing links
These are links going to different origins than the main page.
Title: FAQ
Search URL Search Domain Scan URL
Title: Help Centre
Search URL Search Domain Scan URL
Title: Terms of Use
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Title: Cookie Preferences
Search URL Search Domain Scan URL
Title: Corporate Information
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
netflix-discount.com/ |
296 KB 72 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none
codex.nflxext.com/%5E2.0.0/truthBundle/webui/0.0.1-shakti-js-mk-vcc258fbf/js/js/bootstrap.js,common%7Cbootstrap.js/2/4Y044t4r4c4v09484z4X070t014Z4y4m4B4w0e4P4N4L4h4A4p4D18034T/bck/true/ |
8 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none
codex.nflxext.com/%5E2.0.0/truthBundle/webui/0.0.1-shakti-js-mk-vcc258fbf/js/js/torii%7CregistrationClient.js/2/4Y044t4r4c4v09484z4X070t014Z4y4m4B4w0e4P4N4L4h4A4p4D18034T/l/true/ |
778 KB 240 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WebsiteDetect
netflix-discount.com/ichnaea/cl2/freeform/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
none
codex.nflxext.com/%5E2.0.0/truthBundle/webui/0.0.1-shakti-css-vcc258fbf/css/css/less%7Cpages%7Cregistration.less/2/0B0P040J090y0I0U0X0Q0K0O0W0-/none/true/ |
89 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
WebsiteDetect
netflix-discount.com/ichnaea/cl2/freeform/ |
351 B 319 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
nf-icon-v1-93.woff
assets.nflxext.com/ffe/siteui/fonts/ |
72 KB 72 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
log
netflix-discount.com/ichnaea/ |
328 B 313 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
cl2
www.netflix.com/ichnaea/ |
0 1011 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
cl2
www.netflix.com/ichnaea/ |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| netflix object| Codex object| C object| global object| process object| __core-js_shared__ object| util function| jQuery object| jQuery1111016053903705580422 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.netflix-discount.com/ | Name: cL Value: 1539742611246%7C153974261131919725%7C153974261139973957%7C%7C4%7C2L4DWZJB3VD4HFJNQNGED5QWWY |
|
.netflix-discount.com/ | Name: __cfduid Value: d07d1ca7e23835274e4d12000602075491539742610 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
codex.nflxext.com
netflix-discount.com
www.netflix.com
2606:4700:30::6812:21e8
2a01:578:3::3433:b30e
2a01:578:3::36ab:de23
2a02:26f0:6c00:297::33c4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