s3.amazonaws.com
Open in
urlscan Pro
52.216.18.251
Malicious Activity!
Public Scan
Submission: On August 02 via manual from US
Summary
This is the only time s3.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 52.216.18.251 52.216.18.251 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::2014 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 104.103.108.60 104.103.108.60 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
2 | 52.216.133.77 52.216.133.77 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 45.40.130.22 45.40.130.22 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
16 | 7 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
s3.amazonaws.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-103-108-60.deploy.static.akamaitechnologies.com
img1.wsimg.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
s3.amazonaws.com |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-45-40-130-22.ip.secureserver.net
img.secureserver.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
amazonaws.com
s3.amazonaws.com |
431 KB |
2 |
gstatic.com
fonts.gstatic.com |
24 KB |
1 |
secureserver.net
img.secureserver.net |
587 B |
1 |
wsimg.com
img1.wsimg.com |
5 KB |
1 |
appspot.com
geoapi123.appspot.com |
426 B |
1 |
googleapis.com
fonts.googleapis.com |
557 B |
16 | 6 |
Domain | Requested by | |
---|---|---|
10 | s3.amazonaws.com |
s3.amazonaws.com
|
2 | fonts.gstatic.com |
s3.amazonaws.com
|
1 | img.secureserver.net | |
1 | img1.wsimg.com |
s3.amazonaws.com
|
1 | geoapi123.appspot.com |
s3.amazonaws.com
|
1 | fonts.googleapis.com |
s3.amazonaws.com
|
16 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/index.htm
Frame ID: 1E92D2E5867F6C95E003BC09D6771491
Requests: 16 HTTP requests in this frame
Screenshot
Detected technologies
Amazon S3 (Miscellaneous) ExpandDetected patterns
- headers server /AmazonS3/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.htm
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/ |
69 KB 69 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
2 KB 557 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
geoapi123.appspot.com/ |
400 B 426 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/files/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background-2.png
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/files/ |
251 KB 251 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alert.jpg
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/files/ |
37 KB 37 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
microsoft.png
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/files/ |
977 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/ |
655 B 1010 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
tcc_l.combined.1.0.6.min.js
img1.wsimg.com/tcc/ |
12 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mem5YaGs126MiZpBA-UNirkOUuhs.ttf
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/s/opensans/v15/ |
27 KB 27 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mem5YaGs126MiZpBA-UN7rgOUuhs.ttf
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/s/opensans/v15/ |
28 KB 28 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
NaPecZTIAOhVxoMyOr9n_E7fdMPmDaZRbrw.woff2
fonts.gstatic.com/s/titilliumweb/v6/ |
12 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alertmicrosoft.mp3
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/files/ |
96 KB 0 |
Media
audio/mp3 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
warning.mp3
s3.amazonaws.com/microsoft-windows-security-alert-malware-found/chrome_win/files/ |
13 KB 14 KB |
Media
audio/mp3 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
event
img.secureserver.net/t/1/tl/ |
43 B 587 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
NaPDcZTIAOhVxoMyOr9n_E7ffHjDGItzY5abuWI.woff2
fonts.gstatic.com/s/titilliumweb/v6/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| geoip_country_code function| geoip_country_name function| geoip_city function| geoip_region function| geoip_region_name function| geoip_latitude function| geoip_longitude function| geoip_postal_code function| geoip_area_code function| geoip_metro_code string| phone_number function| evali function| eval1 object| _trfd function| tcg function| tcp object| perfhandler object| TCCTracker object| _trfq object| true0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
geoapi123.appspot.com
img.secureserver.net
img1.wsimg.com
s3.amazonaws.com
104.103.108.60
2a00:1450:4001:81d::2003
2a00:1450:4001:81d::200a
2a00:1450:4001:81d::2014
45.40.130.22
52.216.133.77
52.216.18.251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