www.goldilutz.com Open in urlscan Pro
50.87.248.133  Malicious Activity! Public Scan

URL: http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
Submission: On July 25 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 50.87.248.133, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is www.goldilutz.com.
This is the only time www.goldilutz.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
4 50.87.248.133 46606 (UNIFIEDLA...)
4 1
Apex Domain
Subdomains
Transfer
4 goldilutz.com
www.goldilutz.com
36 KB
4 1
Domain Requested by
4 www.goldilutz.com www.goldilutz.com
4 1

This site contains links to these domains. Also see Links.

Domain
m.facebook.com
Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
Frame ID: 4604.1
Requests: 4 HTTP requests in this frame

Screenshot


Page Statistics

4
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

36 kB
Transfer

121 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request sign_in.html
www.goldilutz.com/offerup-accounts/
4 KB
2 KB
Document
General
Full URL
http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
Protocol
HTTP/1.1
Server
50.87.248.133 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1133.bluehost.com
Software
nginx/1.12.0 /
Resource Hash
404af62d46638e506924d197896a69035a458342de1017d74a96a34ed3d54410

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 25 Jul 2017 19:26:31 GMT
Content-Encoding
gzip
Last-Modified
Mon, 24 Jul 2017 02:47:36 GMT
Server
nginx/1.12.0
Vary
Accept-Encoding
Content-Type
text/html
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1992
w2ZgxVPxn4D.css
www.goldilutz.com/offerup-accounts/sign_in_files/
80 KB
22 KB
Stylesheet
General
Full URL
http://www.goldilutz.com/offerup-accounts/sign_in_files/w2ZgxVPxn4D.css
Requested by
Host: www.goldilutz.com
URL: http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
Protocol
HTTP/1.1
Server
50.87.248.133 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1133.bluehost.com
Software
nginx/1.12.0 /
Resource Hash
996d5d028d877b038957412784a35ba13bdab4805e7369e4395d117cc3efef82

Request headers

Referer
http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 25 Jul 2017 19:26:31 GMT
Content-Encoding
gzip
Last-Modified
Mon, 24 Jul 2017 02:47:41 GMT
Server
nginx/1.12.0
Vary
Accept-Encoding
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
23032
lptpyJRZARh.css
www.goldilutz.com/offerup-accounts/sign_in_files/
35 KB
11 KB
Stylesheet
General
Full URL
http://www.goldilutz.com/offerup-accounts/sign_in_files/lptpyJRZARh.css
Requested by
Host: www.goldilutz.com
URL: http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
Protocol
HTTP/1.1
Server
50.87.248.133 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1133.bluehost.com
Software
nginx/1.12.0 /
Resource Hash
e79bfab30441deed58c22baea4abe3802b817daff163812f9d383754a0f83a0e

Request headers

Referer
http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 25 Jul 2017 19:26:31 GMT
Content-Encoding
gzip
Last-Modified
Mon, 24 Jul 2017 02:47:39 GMT
Server
nginx/1.12.0
Vary
Accept-Encoding
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
11403
logo.png
www.goldilutz.com/offerup-accounts/sign_in_files/
809 B
832 B
Image
General
Full URL
http://www.goldilutz.com/offerup-accounts/sign_in_files/logo.png
Requested by
Host: www.goldilutz.com
URL: http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
Protocol
HTTP/1.1
Server
50.87.248.133 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
box1133.bluehost.com
Software
nginx/1.12.0 /
Resource Hash
e0ff2e0f45b6ac64540fe750795196238188e4e3a5ae9138318dd555b23a2eae

Request headers

Referer
http://www.goldilutz.com/offerup-accounts/sign_in.html?statusid=b9640cca21af7a692a86bad3928ad323
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 25 Jul 2017 19:26:31 GMT
Content-Encoding
gzip
Last-Modified
Mon, 24 Jul 2017 02:47:39 GMT
Server
nginx/1.12.0
Vary
Accept-Encoding
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
832

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies