anazon.co.jp.fe9wt2z.xyz
Open in
urlscan Pro
45.151.144.198
Malicious Activity!
Public Scan
Submission: On January 29 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on January 29th 2024. Valid for: 3 months.
This is the only time anazon.co.jp.fe9wt2z.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon Japan (Online) Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 45.151.144.198 45.151.144.198 | 29470 (RETNNET-AS) (RETNNET-AS) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
fe9wt2z.xyz
anazon.co.jp.fe9wt2z.xyz |
108 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | anazon.co.jp.fe9wt2z.xyz |
anazon.co.jp.fe9wt2z.xyz
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
fe9wt2z.xyz R3 |
2024-01-29 - 2024-04-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://anazon.co.jp.fe9wt2z.xyz/ap/signin.php?openid.pape.max_auth_age=0&openid.return_to=%b50f211628c516eb2bd23f7039968a12251dfcf7
Frame ID: FC7087C5983CBE5D14DEF6F9FF6D81C0
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
signin.php
anazon.co.jp.fe9wt2z.xyz/ap/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0c79e9da320f45529a3e6546090c8201.css
anazon.co.jp.fe9wt2z.xyz/ap/static/css/ |
130 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9ebdfb9b9cba457183a9eee44433802a.css
anazon.co.jp.fe9wt2z.xyz/ap/static/css/ |
36 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11pxfkbmcrl.css
anazon.co.jp.fe9wt2z.xyz/ap/static/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-style.css
anazon.co.jp.fe9wt2z.xyz/ap/static/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
anazon.co.jp.fe9wt2z.xyz/ap/static/js/ |
87 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6c7247b40839404aadca53196aba9885.gif
anazon.co.jp.fe9wt2z.xyz/ap/static/picture/ |
43 B 247 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pointer.png
anazon.co.jp.fe9wt2z.xyz/ap/static/images/ |
181 B 386 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mpgmt0r6ietyiee.png
anazon.co.jp.fe9wt2z.xyz/ap/static/images/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
eyzhm86n6zcdpta.png
anazon.co.jp.fe9wt2z.xyz/ap/static/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon Japan (Online) Amazon (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
anazon.co.jp.fe9wt2z.xyz/ | Name: PHPSESSID Value: 2l34iak6evn6cpr2af1vfqq28t |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
anazon.co.jp.fe9wt2z.xyz
45.151.144.198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