www.pof.org.hk
Open in
urlscan Pro
58.64.146.153
Malicious Activity!
Public Scan
Effective URL: http://www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/
Submission: On October 04 via automatic, source openphish
Summary
This is the only time www.pof.org.hk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 6 | 58.64.146.153 58.64.146.153 | 17444 (NWT-AS-AP...) (NWT-AS-AP AS number for New World Telephone Ltd.) | |
2 | 2a00:86c0:209... 2a00:86c0:2090::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN - Netflix Streaming Services Inc.) | |
6 | 2 |
ASN17444 (NWT-AS-AP AS number for New World Telephone Ltd., HK)
www.pof.org.hk |
ASN40027 (NETFLIX-ASN - Netflix Streaming Services Inc., US)
assets.nflxext.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
pof.org.hk
2 redirects
www.pof.org.hk |
110 KB |
2 |
nflxext.com
assets.nflxext.com |
175 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
6 | www.pof.org.hk |
2 redirects
www.pof.org.hk
|
2 | assets.nflxext.com | |
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.1.nflxso.net DigiCert SHA2 Secure Server CA |
2019-09-18 - 2019-10-19 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/
Frame ID: EA84EB8D64C8F4A8706EE4A45B585D3E
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.pof.org.hk/ecard/image/count/
HTTP 302
http://www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90 HTTP 301
http://www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.pof.org.hk/ecard/image/count/
HTTP 302
http://www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90 HTTP 301
http://www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/ Redirect Chain
|
5 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hok.js
www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/ |
20 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
z.css
www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/css/ |
35 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
a.css
www.pof.org.hk/ecard/image/count/a7fa85eab4d8499538282ff90/css/ |
49 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-daredevil-1500x1000.2.jpg
assets.nflxext.com/ffe/siteui/acquisition/login/ |
96 KB 97 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-80.woff
assets.nflxext.com/ffe/siteui/fonts/ |
78 KB 78 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Netflix (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
www.pof.org.hk
2a00:86c0:2090::1
58.64.146.153
2555364bdd6374d0c273c69322f2f78554c02fe630ee6582eeb2d2c9031d1a9d
2fe58973af7207f53c1b315444103f8262b3e4d58c67c7770c68b852a5a8bceb
3a50ca9a9de55d6c44988db13049847f50e1d35ffe141a7b95fbf4d741ec5eb9
4abd9472f2e7b527e94d3861e1be1bcb93e7aea5540a8675b68659cd45da427c
7131bec2f0db051e6501f4c8523d0cad23dca3a5813306ab5458e53a3bf6a820
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8