www.updatepayments.cf
Open in
urlscan Pro
2400:cb00:2048:1::681b:ab0e
Malicious Activity!
Public Scan
Submission: On May 25 via automatic, source openphish
Summary
This is the only time www.updatepayments.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2400:cb00:204... 2400:cb00:2048:1::681b:ab0e | 13335 (CLOUDFLAR...) (CLOUDFLARENET - CloudFlare) | |
4 | 2a02:26f0:78:... 2a02:26f0:78::5f64:f89b | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
11 | 3 |
ASN13335 (CLOUDFLARENET - CloudFlare, Inc., US)
www.updatepayments.cf |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
updatepayments.cf
www.updatepayments.cf |
105 KB |
4 |
akamaihd.net
fbstatic-a.akamaihd.net |
229 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.updatepayments.cf |
www.updatepayments.cf
|
4 | fbstatic-a.akamaihd.net |
www.updatepayments.cf
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
a248.e.akamai.net Symantec Class 3 ECC 256 bit SSL CA - G2 |
2016-07-28 - 2017-07-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.updatepayments.cf/update-payment.html
Frame ID: 1734.1
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
update-payment.html
www.updatepayments.cf/ |
17 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xcd4Cels.css
www.updatepayments.cf/update-payment_files/ |
58 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fXKuyC3I.css
www.updatepayments.cf/update-payment_files/ |
362 KB 59 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.js
www.updatepayments.cf/update-payment_files/ |
4 KB 842 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Upgradepayment.jpg
www.updatepayments.cf/update-payment_files/ |
13 KB 13 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kT2ocXFCst4.gif
www.updatepayments.cf/update-payment_files/ |
6 KB 6 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
182 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Cou7n-nqK52.gif
fbstatic-a.akamaihd.net/rsrc.php/v2/yd/r/ |
119 B 137 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7rpZ7CHyvX7.gif
fbstatic-a.akamaihd.net/rsrc.php/v2/yt/r/ |
74 B 92 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wLT6Ip0h51L.png
fbstatic-a.akamaihd.net/rsrc.php/v2/yZ/r/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cDUSqVVxJZv.png
fbstatic-a.akamaihd.net/rsrc.php/v2/yf/r/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
www.updatepayments.cf/ |
209 B 205 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.updatepayments.cf/ | Name: __cfduid Value: dfb239444f4e5133bb339ee364206aea81495727951 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fbstatic-a.akamaihd.net
www.updatepayments.cf
2400:cb00:2048:1::681b:ab0e
2a02:26f0:78::5f64:f89b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