emails-verification.com
Open in
urlscan Pro
2001:8d8:100f:f000::200
Malicious Activity!
Public Scan
Submission: On July 22 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G2 on July 22nd 2024. Valid for: a year.
This is the only time emails-verification.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2001:8d8:100f... 2001:8d8:100f:f000::200 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
5 | 2a02:26f0:480... 2a02:26f0:480:aae::1477 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
6 | 2620:1ec:bdf::45 2620:1ec:bdf::45 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 203.161.61.122 203.161.61.122 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
1 | 2606:4700:20:... 2606:4700:20::ac43:453b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700:20:... 2606:4700:20::681a:9af | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 7 |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
emails-verification.com |
ASN20940 (AKAMAI-ASN1, NL)
store.storeimages.cdn-apple.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
msauth.net
acctcdn.msauth.net — Cisco Umbrella Rank: 6878 |
118 KB |
5 |
cdn-apple.com
store.storeimages.cdn-apple.com — Cisco Umbrella Rank: 36214 |
65 KB |
2 |
emails-verification.com
emails-verification.com |
26 KB |
1 |
1000logos.net
1000logos.net — Cisco Umbrella Rank: 155595 |
55 KB |
1 |
usb.mk
usb.mk |
43 KB |
1 |
nicepng.com
www.nicepng.com — Cisco Umbrella Rank: 292059 |
19 KB |
0 |
apple.com
Failed
www.apple.com Failed |
|
17 | 7 |
Domain | Requested by | |
---|---|---|
6 | acctcdn.msauth.net |
emails-verification.com
|
5 | store.storeimages.cdn-apple.com |
emails-verification.com
|
2 | emails-verification.com | |
1 | 1000logos.net |
emails-verification.com
|
1 | usb.mk |
emails-verification.com
|
1 | www.nicepng.com |
emails-verification.com
|
0 | www.apple.com Failed |
emails-verification.com
|
17 | 7 |
This site contains links to these domains. Also see Links.
Domain |
---|
account.live.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.emails-verification.com Encryption Everywhere DV TLS CA - G2 |
2024-07-22 - 2025-07-21 |
a year | crt.sh |
store.storeimages.cdn-apple.com Apple Public Server RSA CA 11 - G1 |
2024-04-21 - 2024-10-18 |
6 months | crt.sh |
identitycdn.msauth.net Microsoft Azure RSA TLS Issuing CA 03 |
2024-06-07 - 2025-06-02 |
a year | crt.sh |
nicepng.com R11 |
2024-06-21 - 2024-09-19 |
3 months | crt.sh |
usb.mk WE1 |
2024-07-14 - 2024-10-12 |
3 months | crt.sh |
1000logos.net Cloudflare Inc ECC CA-3 |
2023-09-19 - 2024-09-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://emails-verification.com/
Frame ID: 8854C64443BE6CC15D6624584A545B13
Requests: 17 HTTP requests in this frame
Screenshot
Detected technologies
WordPress (CMS) ExpandDetected patterns
- /wp-(?:content|includes)/
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
emails-verification.com/ |
85 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common-handheld.css
store.storeimages.cdn-apple.com/4973/store.apple.com/shop/rs/rel/ |
122 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin-handheld.css
store.storeimages.cdn-apple.com/4973/store.apple.com/shop/rs/rel/ |
28 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
external.css
store.storeimages.cdn-apple.com/4973/store.apple.com/shop/rs-external/rel/us/ |
45 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fonts
www.apple.com/wss/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
converged_ux_v2_z97rWL6MibhVCUeivX27gg2.css
acctcdn.msauth.net/ |
93 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquerypackage_1.10_5V7LAuc3bNAQx2QQfr1RPw2.js
acctcdn.msauth.net/ |
94 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap_3.3.0_B68S-_daR6nLiLVZsh4XiA2.js
acctcdn.msauth.net/ |
37 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wlivepackagefull_cHeSkPsNhc9yilRlgEedHg2.js
acctcdn.msauth.net/ |
57 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
knockout_9HcnWxbPHdJ-ovZeA-tF1g2.js
acctcdn.msauth.net/ |
76 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
345-3457051_microsoft-outlook-microsoft-outlook-2013-logo.png
www.nicepng.com/png/full/ |
22 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
newgmaillogo.0.jpg
usb.mk/wp-content/uploads/2020/10/ |
42 KB 43 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Yahoo-logo.jpg
1000logos.net/wp-content/uploads/2017/05/ |
55 KB 55 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common-handheld@2x.css
store.storeimages.cdn-apple.com/4973/store.apple.com/shop/rs/rel/ |
124 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin-handheld@2x.css
store.storeimages.cdn-apple.com/4973/store.apple.com/shop/rs/rel/ |
28 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
convergedbg_small_v2_Z9GCPpM7FVE8hxRSZUez6g2.jpg
acctcdn.msauth.net/images/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
emails-verification.com/ |
626 B 479 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.apple.com
- URL
- https://www.apple.com/wss/fonts?family=Myriad+Set+Pro&weights=200,300,400,500,600,700&v=2
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _ge object| _d object| _dh object| $U function| GetString object| $B function| $ function| jQuery object| jQuery110203562102331871837 object| KnockoutExtensions object| ko function| WizardExternalHelper object| WIZARDUIConfig object| WIZARDUI function| OnBack function| OnNext function| setFocus function| evt_master_onload object| HOSTUI0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1000logos.net
acctcdn.msauth.net
emails-verification.com
store.storeimages.cdn-apple.com
usb.mk
www.apple.com
www.nicepng.com
www.apple.com
2001:8d8:100f:f000::200
203.161.61.122
2606:4700:20::681a:9af
2606:4700:20::ac43:453b
2620:1ec:bdf::45
2a02:26f0:480:aae::1477
011dee4d85392803f3f7aed57fd01d19f2597db44ba74151da6ee1a750dd5312
11d2e0a4b55972b3939b29b8569f4bb1918e0feeaf0a2a35991ed1fdc7e0b7f0
1fa92ab83c2bd7f112d5a8d633662507a4dae1e9b3181abab070551e2f79766e
2d37191a3ff388d282c09350ecf39a3eb9e6da48296b9ea35beccbff92d1725b
2fc556a2bd01fd5c7899476cf53a9f9192f46e1c735f872dc6c2f2415c5f29b1
427eb53aa44883b58b6bcd4910d1fce92856cdcbdade2db1954c6a2ac32e4ad4
43002300f3e2a364bfb482ce0bf86a7679c63af93f5c1b507e4892c7b03987c2
44e4c38e72261b9c1ff134f0b10767d87f5a8339a7cfbae03667e9c53a8cdf2b
5776881753b95a0abe5d1f6efe3abe7b83a3265eaccd117dd948e523c044600c
74ac52d11c9bb070670a89aa26554c6cb8ad9bf69376b970b119471459d9ceaf
7c5b985686edd2fbb3f8c3f4f531dc64e5ef62fd0b5a31f91a1517aaffb4562a
bcaa8554884ea8a43d6dfe30dcb14f34772bf62d0766e94ac757588af8fb38df
d36e606f9e0b062fe0afc928875c99b8c5a931e9b29be7ec19159d6dbadf8f5b
e02b6002a64d71687ee26e9bf5228bf5e79a01980e92338371bc79f6a259cedd
f335cee868a97809bd5569fca9e72095ed9a92b7dcc4fdcd278b406bec3ba1d5
fd5f1fb891fd0a43966a44faa10eea78b0441cb84f355734f2a586a280cff8e1