www.lcloud.flnd-fml-ld.us
Open in
urlscan Pro
162.240.106.111
Malicious Activity!
Public Scan
Submission: On February 13 via automatic, source openphish — Scanned from US
Summary
This is the only time www.lcloud.flnd-fml-ld.us was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Apple (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 162.240.106.111 162.240.106.111 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
13 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: vps-1181717.hdsptm4.online
www.lcloud.flnd-fml-ld.us |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
flnd-fml-ld.us
www.lcloud.flnd-fml-ld.us |
1 MB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 761 |
33 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | www.lcloud.flnd-fml-ld.us |
www.lcloud.flnd-fml-ld.us
|
1 | code.jquery.com |
www.lcloud.flnd-fml-ld.us
|
13 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
iforgot.apple.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.lcloud.flnd-fml-ld.us/signnewesp.php
Frame ID: 1B9F0E0BE579197342F10FE946414EE0
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
iCloudDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
animate.css (Web Frameworks) Expand
Detected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: ¿Olvidaste tu ID de Apple o la contraseña?
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signnewesp.php
www.lcloud.flnd-fml-ld.us/ |
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
strap.css
www.lcloud.flnd-fml-ld.us/assets/layout/ |
124 KB 125 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apple.css
www.lcloud.flnd-fml-ld.us/assets/layout/ |
16 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kit.css
www.lcloud.flnd-fml-ld.us/assets/layout/ |
11 KB 11 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
animate.css
www.lcloud.flnd-fml-ld.us/assets/layout/ |
69 KB 70 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mapmov.png
www.lcloud.flnd-fml-ld.us/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ajax-loader.gif
www.lcloud.flnd-fml-ld.us/assets/img/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sep.png
www.lcloud.flnd-fml-ld.us/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.3.min.js
code.jquery.com/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Lato-Light.woff
www.lcloud.flnd-fml-ld.us/assets/font/ |
461 KB 462 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.png
www.lcloud.flnd-fml-ld.us/assets/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
forgetbg.png
www.lcloud.flnd-fml-ld.us/assets/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Lato-Regular.woff
www.lcloud.flnd-fml-ld.us/assets/font/ |
468 KB 468 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Apple (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| funciones0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
www.lcloud.flnd-fml-ld.us
162.240.106.111
2a04:4e42::649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