reactivate-applepay.com Open in urlscan Pro
91.224.22.76  Malicious Activity! Public Scan

URL: https://reactivate-applepay.com/
Submission Tags: @phishunt_io
Submission: On April 01 via api from DE — Scanned from DE

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 91.224.22.76, located in Russian Federation and belongs to AS-REG, RU. The main domain is reactivate-applepay.com.
TLS certificate: Issued by R3 on April 1st 2022. Valid for: 3 months.
This is the only time reactivate-applepay.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Apple (Online)

Domain & IP information

IP Address AS Autonomous System
1 91.224.22.76 197695 (AS-REG)
1 2a02:26f0:170... 20940 (AKAMAI-ASN1)
2 2
Apex Domain
Subdomains
Transfer
1 apple.com
www.apple.com — Cisco Umbrella Rank: 211
3 KB
1 reactivate-applepay.com
reactivate-applepay.com
3 KB
2 2
Domain Requested by
1 www.apple.com reactivate-applepay.com
1 reactivate-applepay.com
2 2

This site contains no links.

Subject Issuer Validity Valid
reactivate-applepay.com
R3
2022-04-01 -
2022-06-30
3 months crt.sh
www.apple.com
Apple Public EV Server RSA CA 2 - G1
2021-09-08 -
2022-10-08
a year crt.sh

This page contains 1 frames:

Primary Page: https://reactivate-applepay.com/
Frame ID: 4856D2EBEC7B7DFF343B200EA264338F
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

6 kB
Transfer

5 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
reactivate-applepay.com/
2 KB
3 KB
Document
General
Full URL
https://reactivate-applepay.com/
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
91.224.22.76 , Russian Federation, ASN197695 (AS-REG, RU),
Reverse DNS
mskf22-76-v.ooohoting.com
Software
Apache /
Resource Hash
389a731c214289ea00cf54ec90ed8c810a1b00e07502e9b65e4735a614b982ed

Request headers

Accept-Language
de-DE,de;q=0.9
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.60 Safari/537.36

Response headers

Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Fri, 01 Apr 2022 21:53:40 GMT
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Keep-Alive
timeout=5, max=100
Pragma
no-cache
Server
Apache
Transfer-Encoding
chunked
hero_logo_small_2x.jpg
www.apple.com/v/apple-pay/i/images/shared/
3 KB
3 KB
Image
General
Full URL
https://www.apple.com/v/apple-pay/i/images/shared/hero_logo_small_2x.jpg
Requested by
Host: reactivate-applepay.com
URL: https://reactivate-applepay.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:26f0:1700:581::1aca Frankfurt am Main, Germany, ASN20940 (AKAMAI-ASN1, NL),
Reverse DNS
Software
Apple /
Resource Hash
c2e9d92e5b67c2960857b8601367e6c1f12c25290c76bb8541fe355d5a3985f8
Security Headers
Name Value
Content-Security-Policy default-src 'self' blob: data: *.akamaized.net *.apple.com *.apple-mapkit.com *.cdn-apple.com *.organicfruitapps.com; child-src blob: embed.music.apple.com embed.podcasts.apple.com swdlp.apple.com www.apple.com www.instagram.com platform.twitter.com www.youtube-nocookie.com; img-src 'unsafe-inline' blob: data: *.apple.com *.apple-mapkit.com *.cdn-apple.com *.mzstatic.com; script-src 'unsafe-inline' 'unsafe-eval' blob: *.apple.com *.apple-mapkit.com www.instagram.com platform.twitter.com; style-src 'unsafe-inline' *.apple.com
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://reactivate-applepay.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.60 Safari/537.36

Response headers

content-security-policy
default-src 'self' blob: data: *.akamaized.net *.apple.com *.apple-mapkit.com *.cdn-apple.com *.organicfruitapps.com; child-src blob: embed.music.apple.com embed.podcasts.apple.com swdlp.apple.com www.apple.com www.instagram.com platform.twitter.com www.youtube-nocookie.com; img-src 'unsafe-inline' blob: data: *.apple.com *.apple-mapkit.com *.cdn-apple.com *.mzstatic.com; script-src 'unsafe-inline' 'unsafe-eval' blob: *.apple.com *.apple-mapkit.com www.instagram.com platform.twitter.com; style-src 'unsafe-inline' *.apple.com
x-content-type-options
nosniff
last-modified
Mon, 17 Sep 2018 16:16:45 GMT
server
Apple
date
Fri, 01 Apr 2022 21:53:40 GMT
x-frame-options
SAMEORIGIN
x-cache
TCP_HIT from a184-86-102-133.deploy.akamaitechnologies.com (AkamaiGHost/10.7.3.1-40349883) (-)
content-type
image/jpeg
nncoection
close
cache-control
max-age=1376
strict-transport-security
max-age=31536000; includeSubdomains
accept-ranges
bytes
content-length
2599
x-xss-protection
1; mode=block
expires
Fri, 01 Apr 2022 22:16:36 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Apple (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails

1 Cookies

Domain/Path Name / Value
reactivate-applepay.com/ Name: PHPSESSID
Value: 4b288700a5fe8d800f7e9ce8eea1b7ea

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

reactivate-applepay.com
www.apple.com
2a02:26f0:1700:581::1aca
91.224.22.76
389a731c214289ea00cf54ec90ed8c810a1b00e07502e9b65e4735a614b982ed
c2e9d92e5b67c2960857b8601367e6c1f12c25290c76bb8541fe355d5a3985f8