apple-pay-activate-verification.com Open in urlscan Pro
185.246.221.60  Malicious Activity! Public Scan

URL: http://apple-pay-activate-verification.com/
Submission: On December 27 via api from JP — Scanned from JP

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 185.246.221.60, located in Bulgaria and belongs to AS_DELIS, US. The main domain is apple-pay-activate-verification.com.
This is the only time apple-pay-activate-verification.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Apple (Online)

Domain & IP information

IP Address AS Autonomous System
1 185.246.221.60 211252 (AS_DELIS)
1 2600:140b:1a0... 20940 (AKAMAI-ASN1)
2 2
Apex Domain
Subdomains
Transfer
1 apple.com
www.apple.com — Cisco Umbrella Rank: 316
3 KB
1 apple-pay-activate-verification.com
apple-pay-activate-verification.com
3 KB
2 2
Domain Requested by
1 www.apple.com apple-pay-activate-verification.com
1 apple-pay-activate-verification.com
2 2

This site contains no links.

Subject Issuer Validity Valid
www.apple.com
Apple Public EV Server RSA CA 2 - G1
2022-04-19 -
2023-05-19
a year crt.sh

This page contains 1 frames:

Primary Page: http://apple-pay-activate-verification.com/
Frame ID: 0F1DEB20A5E62EFB8DD10BB8D96DAFF7
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

50 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

6 kB
Transfer

5 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
apple-pay-activate-verification.com/
2 KB
3 KB
Document
General
Full URL
http://apple-pay-activate-verification.com/
Protocol
HTTP/1.1
Server
185.246.221.60 , Bulgaria, ASN211252 (AS_DELIS, US),
Reverse DNS
Software
Apache /
Resource Hash
3254c8cc614b73f41856da8efa83c0b1450391c7937f2bf90ba235f09253c426

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
close
Content-Type
text/html; charset=UTF-8
Date
Tue, 27 Dec 2022 20:03:19 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Pragma
no-cache
Server
Apache
Transfer-Encoding
chunked
hero_logo_small_2x.jpg
www.apple.com/v/apple-pay/i/images/shared/
3 KB
3 KB
Image
General
Full URL
https://www.apple.com/v/apple-pay/i/images/shared/hero_logo_small_2x.jpg
Requested by
Host: apple-pay-activate-verification.com
URL: http://apple-pay-activate-verification.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2600:140b:1a00:3ae::1aca Tokyo, Japan, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Apple /
Resource Hash
c2e9d92e5b67c2960857b8601367e6c1f12c25290c76bb8541fe355d5a3985f8
Security Headers
Name Value
Content-Security-Policy default-src 'self' blob: data: *.akamaized.net *.apple.com *.apple-mapkit.com *.cdn-apple.com *.organicfruitapps.com; child-src blob: embed.music.apple.com embed.podcasts.apple.com swdlp.apple.com www.apple.com www.instagram.com platform.twitter.com www.youtube-nocookie.com; img-src 'unsafe-inline' blob: data: *.apple.com *.apple-mapkit.com *.cdn-apple.com *.mzstatic.com; script-src 'unsafe-inline' 'unsafe-eval' blob: *.apple.com *.apple-mapkit.com www.instagram.com platform.twitter.com; style-src 'unsafe-inline' *.apple.com
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
http://apple-pay-activate-verification.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/108.0.5359.124 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubdomains
content-security-policy
default-src 'self' blob: data: *.akamaized.net *.apple.com *.apple-mapkit.com *.cdn-apple.com *.organicfruitapps.com; child-src blob: embed.music.apple.com embed.podcasts.apple.com swdlp.apple.com www.apple.com www.instagram.com platform.twitter.com www.youtube-nocookie.com; img-src 'unsafe-inline' blob: data: *.apple.com *.apple-mapkit.com *.cdn-apple.com *.mzstatic.com; script-src 'unsafe-inline' 'unsafe-eval' blob: *.apple.com *.apple-mapkit.com www.instagram.com platform.twitter.com; style-src 'unsafe-inline' *.apple.com
x-content-type-options
nosniff
date
Tue, 27 Dec 2022 20:03:20 GMT
x-cache
TCP_REFRESH_HIT from a23-209-106-50.deploy.akamaitechnologies.com (AkamaiGHost/10.10.3-45298580) (S)
content-length
2599
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Mon, 17 Sep 2018 16:16:45 GMT
server
Apple
x-cache-remote
TCP_REFRESH_HIT from a61-213-189-46.deploy.akamaitechnologies.com (AkamaiGHost/10.10.3-45298580) (S)
x-frame-options
SAMEORIGIN
content-type
image/jpeg
cache-control
max-age=3577
accept-ranges
bytes
expires
Tue, 27 Dec 2022 21:02:57 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Apple (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontentvisibilityautostatechange

1 Cookies

Domain/Path Name / Value
apple-pay-activate-verification.com/ Name: PHPSESSID
Value: 190561533f9211b55e848712e03f08aa

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

apple-pay-activate-verification.com
www.apple.com
185.246.221.60
2600:140b:1a00:3ae::1aca
3254c8cc614b73f41856da8efa83c0b1450391c7937f2bf90ba235f09253c426
c2e9d92e5b67c2960857b8601367e6c1f12c25290c76bb8541fe355d5a3985f8