billingdetails.dns.navy
Open in
urlscan Pro
34.106.23.79
Malicious Activity!
Public Scan
Submission: On June 13 via automatic, source openphish — Scanned from DE
Summary
This is the only time billingdetails.dns.navy was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 34.106.23.79 34.106.23.79 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
10 | 1 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 79.23.106.34.bc.googleusercontent.com
billingdetails.dns.navy |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
dns.navy
billingdetails.dns.navy |
262 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | billingdetails.dns.navy |
billingdetails.dns.navy
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/
Frame ID: 871C27602008FBB5FE9DE9C53C2D9BDF
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/css/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon.ico
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
17 KB 17 KB |
Stylesheet
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/js/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background-medium.jpg
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
215 KB 215 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
check.png
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
577 B 819 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fb.png
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
globe.png
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
down.png
billingdetails.dns.navy/885cb47f87718a2cd8641ae79113eeea/assets/img/ |
634 B 876 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation boolean| error_username boolean| error_password function| validateEmail function| validatePhoneNumber1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
billingdetails.dns.navy/ | Name: PHPSESSID Value: 995d47bb693b5407b146f77b70a6594f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
billingdetails.dns.navy
34.106.23.79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