login.amprabu.shop
Open in
urlscan Pro
172.67.174.121
Malicious Activity!
Public Scan
Effective URL: https://login.amprabu.shop/cdn-cgi/phish-bypass?atok=BeYwVfftGcqwPbcTKrJYropDM2xCTbQLg5ZOb0lar8s-1726899152-0.0.1.1-%2F
Submission Tags: @phish_report
Submission: On September 21 via api from FI — Scanned from SG
Summary
TLS certificate: Issued by WE1 on July 26th 2024. Valid for: 3 months.
This is the only time login.amprabu.shop was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 178.128.63.57 178.128.63.57 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
3 | 2606:4700:303... 2606:4700:3037::ac43:ae79 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 172.67.174.121 172.67.174.121 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
amprabu.shop
login.amprabu.shop |
9 KB |
2 |
akasakaoutdoor.co.id
akasakaoutdoor.co.id |
2 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
7 | login.amprabu.shop |
akasakaoutdoor.co.id
login.amprabu.shop |
2 | akasakaoutdoor.co.id | |
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
akasakaoutdoor.co.id R10 |
2024-09-07 - 2024-12-06 |
3 months | crt.sh |
login.amprabu.shop WE1 |
2024-07-26 - 2024-10-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://login.amprabu.shop/cdn-cgi/phish-bypass?atok=BeYwVfftGcqwPbcTKrJYropDM2xCTbQLg5ZOb0lar8s-1726899152-0.0.1.1-%2F
Frame ID: C68BDEDEEA719B2CE1AB92DF90666600
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
403 ForbiddenPage URL History Show full URLs
- https://akasakaoutdoor.co.id/war138/ Page URL
- https://login.amprabu.shop/ Page URL
- https://login.amprabu.shop/cdn-cgi/phish-bypass?atok=BeYwVfftGcqwPbcTKrJYropDM2xCTbQLg5ZOb0lar8s-172689... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://akasakaoutdoor.co.id/war138/ Page URL
- https://login.amprabu.shop/ Page URL
- https://login.amprabu.shop/cdn-cgi/phish-bypass?atok=BeYwVfftGcqwPbcTKrJYropDM2xCTbQLg5ZOb0lar8s-1726899152-0.0.1.1-%2F Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
akasakaoutdoor.co.id/war138/ |
1 KB 740 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
akasakaoutdoor.co.id/ |
3 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
login.amprabu.shop/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
speculation
login.amprabu.shop/cdn-cgi/ |
128 B 497 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
login.amprabu.shop/cdn-cgi/styles/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
icon-exclamation.png
login.amprabu.shop/cdn-cgi/images/ |
452 B 670 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
login.amprabu.shop/ |
220 B 651 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
phish-bypass
login.amprabu.shop/cdn-cgi/ |
553 B 257 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
login.amprabu.shop/ |
220 B 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
akasakaoutdoor.co.id
login.amprabu.shop
172.67.174.121
178.128.63.57
2606:4700:3037::ac43:ae79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