netflixvalidate.com
Open in
urlscan Pro
101.99.75.19
Malicious Activity!
Public Scan
Submission: On February 17 via automatic, source phishtank
Summary
This is the only time netflixvalidate.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 101.99.75.19 101.99.75.19 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
4 | 23.210.248.92 23.210.248.92 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
14 | 2 |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
PTR: turkey10.ip-asia.com
netflixvalidate.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a23-210-248-92.deploy.static.akamaitechnologies.com
assets.nflxext.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
netflixvalidate.com
netflixvalidate.com |
411 KB |
4 |
nflxext.com
assets.nflxext.com |
8 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
10 | netflixvalidate.com |
netflixvalidate.com
|
4 | assets.nflxext.com |
netflixvalidate.com
|
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://netflixvalidate.com/Verify2.php?sessionid=VtMsXbdJcamAV4wqQTYwMQQKWXb1lo2TvSZovcmEX5QuEZGspNjpoLIxHI6ZJklqtONRU8mkkLNjr749yuLAfQcslqEOTIdbFSviwyWjJ4re77hkMQel2HZIYy2RYyQ3Kq&securessl=true
Frame ID: (793F5DF794D2C179EE8C657A9E00E599)
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
Verify2.php
netflixvalidate.com/ |
25 KB 26 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
001.css
netflixvalidate.com/css/ |
36 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
verify.css
netflixvalidate.com/css/ |
20 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.js
netflixvalidate.com/js/ |
262 KB 262 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
netflixvalidate.com/js/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
netflixvalidate.com/js/ |
21 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
additional-methods.min.js
netflixvalidate.com/js/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.js
netflixvalidate.com/js/ |
6 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
netflixvalidate.com/img/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
norty.png
netflixvalidate.com/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
carrot_sprite_16x33.png
assets.nflxext.com/us/layout/ecweb/common/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
12_11_2014_icon_visa_37x25.png
assets.nflxext.com/us/ffe/siteui/acquisition/payment/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
10_18_2014_icon_master_37x25.png
assets.nflxext.com/us/ffe/siteui/acquisition/payment/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
10_18_2014_icon_amex_37x25.png
assets.nflxext.com/us/ffe/siteui/acquisition/payment/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online) Generic (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| movetoNext function| OnLoad1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
netflixvalidate.com/ | Name: PHPSESSID Value: abbklanepuovps55pad0h3mok4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
netflixvalidate.com
101.99.75.19
23.210.248.92
08bf112e8eabcec45361b70b9915040462661efd6de355c22a6517ce1af897b5
190b90b1f62ad6798fca4c93adce6d0205c13b960b609af306f2d87b54885f85
208994e7418599fbe8296b8b5c8a69736b69e6915aacb9ce8077bb52ce752d11
6dee9ea920e20e09f61903f9d7cade0649ed1a874f094a0b54ed93fbedbdb0a3
7334c16dc04df9eef7152086d519c011301cdbf891aacff4dd28db3d09d32e42
7705fee13417229d718f14947e9860d5bb2b25bd15c9f5cd834f2545c7bad0a6
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40
8ecdaac15d3a735629ac94ec194ea046e3387e8fb5315e043b093725bf21591a
93b5118f9fddb74141e0e3a15fa2902ca7ac0e48d84f7ffd876b81844a0da07a
a47661d7ad003fe7df9ac30d1ce3b984dd9186b676f77b41e0d53f2f4ce4ac8b
bc351c64cd81a9b0f1d9e00bb14fc9b1c4cd6fff55a173e856b2e1fd055e1c9e
c459460a568697ea2988106b3a9d38d9dee5de28636734cbf1fd0bae75b0006c
ca624ad59b666d986f4afb39c166f2a82dad5ce0bbcc20156273150d42c90c7f
f98b2179174b058b3468328d45f17c9434359a547cee7c855f6bdb6e2486191f