URL: https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fmyonlinesecurity.co.uk%2Ffake-santander-bank-fw-account-docum...
Submission: On May 01 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 104.20.110.39, located in San Francisco, United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is www.addtoany.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on March 6th 2018. Valid for: 6 months.
This is the only time www.addtoany.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 104.20.110.39 13335 (CLOUDFLAR...)
1 1
Apex Domain
Subdomains
Transfer
1 addtoany.com
www.addtoany.com
1 KB
1 1
Domain Requested by
1 www.addtoany.com
1 1

This site contains no links.

Subject Issuer Validity Valid
ssl472428.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-03-06 -
2018-09-12
6 months crt.sh

This page contains 1 frames:

Primary Page: https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fmyonlinesecurity.co.uk%2Ffake-santander-bank-fw-account-documents-delivers-trickbot-via-equation-editor-exploits%2F&linkname=Fake%20Santander%20Bank%20%E2%80%9CFW%3A%20Account%20Documents%20%E2%80%9D%20delivers%20Trickbot%20via%20equation%20editor%20exploits
Frame ID: 29F179E7719312B5828B3CE5089549CD
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

3 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request email
www.addtoany.com/add_to/
3 KB
1 KB
Document
General
Full URL
https://www.addtoany.com/add_to/email?linkurl=https%3A%2F%2Fmyonlinesecurity.co.uk%2Ffake-santander-bank-fw-account-documents-delivers-trickbot-via-equation-editor-exploits%2F&linkname=Fake%20Santander%20Bank%20%E2%80%9CFW%3A%20Account%20Documents%20%E2%80%9D%20delivers%20Trickbot%20via%20equation%20editor%20exploits
Protocol
H2
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
104.20.110.39 San Francisco, United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
feff5c3f4d5e2145baa5a04654cba6b63a7bed841db1f685efcbc3410d4e1d14
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

:path
/add_to/email?linkurl=https%3A%2F%2Fmyonlinesecurity.co.uk%2Ffake-santander-bank-fw-account-documents-delivers-trickbot-via-equation-editor-exploits%2F&linkname=Fake%20Santander%20Bank%20%E2%80%9CFW%3A%20Account%20Documents%20%E2%80%9D%20delivers%20Trickbot%20via%20equation%20editor%20exploits
pragma
no-cache
accept-encoding
gzip, deflate
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
cache-control
no-cache
:authority
www.addtoany.com
:scheme
https
:method
GET
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Tue, 01 May 2018 19:41:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
server
cloudflare
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-type
text/html
status
200
set-cookie
__cfduid=d19c2227b8d5a7b6f3f03b3f898ab45211525203660; expires=Wed, 01-May-19 19:41:00 GMT; path=/; domain=.addtoany.com; HttpOnly
cf-ray
4144b91d9e7d96ac-FRA

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

string| final_dest function| soon

1 Cookies

Domain/Path Name / Value
.addtoany.com/ Name: __cfduid
Value: d19c2227b8d5a7b6f3f03b3f898ab45211525203660

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.addtoany.com
104.20.110.39
feff5c3f4d5e2145baa5a04654cba6b63a7bed841db1f685efcbc3410d4e1d14