applepayactivate.com Open in urlscan Pro
47.251.39.53  Malicious Activity! Public Scan

Submitted URL: http://applepayactivate.com/
Effective URL: https://applepayactivate.com/
Submission Tags: @ecarlesi threat #phishing Search All
Submission: On June 19 via api from AU — Scanned from AU

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 47.251.39.53, located in Santa Clara, United States and belongs to ALIBABA-CN-NET Alibaba US Technology Co., Ltd., CN. The main domain is applepayactivate.com.
TLS certificate: Issued by R3 on June 18th 2023. Valid for: 3 months.
This is the only time applepayactivate.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Apple (Online)

Domain & IP information

IP Address AS Autonomous System
1 2 47.251.39.53 45102 (ALIBABA-C...)
1 23.44.0.209 16625 (AKAMAI-AS)
2 2
Apex Domain
Subdomains
Transfer
2 applepayactivate.com
applepayactivate.com
3 KB
1 apple.com
www.apple.com — Cisco Umbrella Rank: 362
3 KB
2 2
Domain Requested by
2 applepayactivate.com 1 redirects
1 www.apple.com applepayactivate.com
2 2

This site contains no links.

Subject Issuer Validity Valid
applepayactivate.com
R3
2023-06-18 -
2023-09-16
3 months crt.sh
www.apple.com
Apple Public EV Server RSA CA 2 - G1
2023-05-02 -
2023-10-28
6 months crt.sh

This page contains 1 frames:

Primary Page: https://applepayactivate.com/
Frame ID: B5C85D0D28987F033812DA3EDF2C867A
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://applepayactivate.com/ HTTP 301
    https://applepayactivate.com/ Page URL

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

6 kB
Transfer

5 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://applepayactivate.com/ HTTP 301
    https://applepayactivate.com/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
applepayactivate.com/
Redirect Chain
  • http://applepayactivate.com/
  • https://applepayactivate.com/
2 KB
3 KB
Document
General
Full URL
https://applepayactivate.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
47.251.39.53 Santa Clara, United States, ASN45102 (ALIBABA-CN-NET Alibaba US Technology Co., Ltd., CN),
Reverse DNS
Software
Apache /
Resource Hash
1c0001287999d0a98f85a0967f0e0dd9940b4f2ab0390d514ffb2085a438e1c6

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Mon, 19 Jun 2023 16:42:29 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive
timeout=5, max=100
Pragma
no-cache
Server
Apache
Transfer-Encoding
chunked

Redirect headers

Connection
close
Content-Length
237
Content-Type
text/html; charset=iso-8859-1
Date
Mon, 19 Jun 2023 16:42:28 GMT
Location
https://applepayactivate.com/
Server
Apache
hero_logo_small_2x.jpg
www.apple.com/v/apple-pay/i/images/shared/
3 KB
3 KB
Image
General
Full URL
https://www.apple.com/v/apple-pay/i/images/shared/hero_logo_small_2x.jpg
Requested by
Host: applepayactivate.com
URL: https://applepayactivate.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.44.0.209 , Singapore, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-44-0-209.deploy.static.akamaitechnologies.com
Software
Apple /
Resource Hash
c2e9d92e5b67c2960857b8601367e6c1f12c25290c76bb8541fe355d5a3985f8
Security Headers
Name Value
Content-Security-Policy default-src 'self' blob: data: *.akamaized.net *.apple.com *.apple-mapkit.com *.cdn-apple.com *.organicfruitapps.com; child-src blob: embed.music.apple.com embed.podcasts.apple.com https://recyclingprogram.apple.com swdlp.apple.com www.apple.com www.instagram.com platform.twitter.com www.youtube-nocookie.com; img-src 'unsafe-inline' blob: data: *.apple.com *.apple-mapkit.com *.cdn-apple.com *.mzstatic.com; script-src 'unsafe-inline' 'unsafe-eval' blob: *.apple.com *.apple-mapkit.com www.instagram.com platform.twitter.com; style-src 'unsafe-inline' *.apple.com
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
en-AU,en;q=0.9
Referer
https://applepayactivate.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.133 Safari/537.36

Response headers

strict-transport-security
max-age=31536000; includeSubdomains
content-security-policy
default-src 'self' blob: data: *.akamaized.net *.apple.com *.apple-mapkit.com *.cdn-apple.com *.organicfruitapps.com; child-src blob: embed.music.apple.com embed.podcasts.apple.com https://recyclingprogram.apple.com swdlp.apple.com www.apple.com www.instagram.com platform.twitter.com www.youtube-nocookie.com; img-src 'unsafe-inline' blob: data: *.apple.com *.apple-mapkit.com *.cdn-apple.com *.mzstatic.com; script-src 'unsafe-inline' 'unsafe-eval' blob: *.apple.com *.apple-mapkit.com www.instagram.com platform.twitter.com; style-src 'unsafe-inline' *.apple.com
x-content-type-options
nosniff
date
Mon, 19 Jun 2023 16:42:31 GMT
x-cache
TCP_MISS from a23-44-4-29.deploy.akamaitechnologies.com (AkamaiGHost/11.1.1-48600985) (-)
content-length
2599
x-xss-protection
1; mode=block
referrer-policy
no-referrer-when-downgrade
last-modified
Mon, 17 Sep 2018 16:16:45 GMT
server
Apple
x-cache-remote
TCP_REFRESH_HIT from a184-50-85-134.deploy.akamaitechnologies.com (AkamaiGHost/11.1.1-48600985) (S)
x-frame-options
SAMEORIGIN
content-type
image/jpeg
cache-control
max-age=3571
accept-ranges
bytes
expires
Mon, 19 Jun 2023 17:42:02 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Apple (Online)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend

1 Cookies

Domain/Path Name / Value
applepayactivate.com/ Name: PHPSESSID
Value: 25c333a55dff61facc8465b1f593e3eb

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

applepayactivate.com
www.apple.com
23.44.0.209
47.251.39.53
1c0001287999d0a98f85a0967f0e0dd9940b4f2ab0390d514ffb2085a438e1c6
c2e9d92e5b67c2960857b8601367e6c1f12c25290c76bb8541fe355d5a3985f8