www.p2.kenzoken.com
Open in
urlscan Pro
104.161.23.18
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On October 24 via api from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 11th 2020. Valid for: 3 months.
This is the only time www.p2.kenzoken.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 104.161.23.18 104.161.23.18 | 53755 (IOFLOOD) (IOFLOOD) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 185.199.109.153 185.199.109.153 | 54113 (FASTLY) (FASTLY) | |
2 | 2a00:1450:400... 2a00:1450:4001:81f::2003 | 15169 (GOOGLE) (GOOGLE) | |
11 | 7 |
ASN53755 (IOFLOOD, US)
PTR: corporate.vip2.noc401.com
www.p2.kenzoken.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
gstatic.com
fonts.gstatic.com |
28 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
29 KB |
2 |
kenzoken.com
www.p2.kenzoken.com |
8 KB |
1 |
github.io
catamphetamine.github.io |
37 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
26 KB |
1 |
googleapis.com
fonts.googleapis.com |
689 B |
0 |
parsleyjs.org
Failed
parsleyjs.org Failed |
|
11 | 7 |
Domain | Requested by | |
---|---|---|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | maxcdn.bootstrapcdn.com |
www.p2.kenzoken.com
|
2 | www.p2.kenzoken.com |
www.p2.kenzoken.com
|
1 | catamphetamine.github.io |
www.p2.kenzoken.com
|
1 | cdnjs.cloudflare.com |
www.p2.kenzoken.com
|
1 | fonts.googleapis.com |
www.p2.kenzoken.com
|
0 | parsleyjs.org Failed |
www.p2.kenzoken.com
|
11 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
p2.kenzoken.com cPanel, Inc. Certification Authority |
2020-08-11 - 2020-11-09 |
3 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
www.github.com DigiCert SHA2 High Assurance Server CA |
2020-05-06 - 2022-04-14 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.p2.kenzoken.com/
Frame ID: BA2B2791E437260AF7D904850E7F8279
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.p2.kenzoken.com/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
4 KB 689 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/ |
82 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pp.png
www.p2.kenzoken.com/public/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
libphonenumber-js.min.js
catamphetamine.github.io/libphonenumber-js/ |
135 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
parsley.js
parsleyjs.org/dist/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fr.js
parsleyjs.org/dist/i18n/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XRXW3I6Li01BKofA6sKUYevIWzgPDA.woff2
fonts.gstatic.com/s/nunito/v14/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XRXW3I6Li01BKofA-seUYevIWzgPDA.woff2
fonts.gstatic.com/s/nunito/v14/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- parsleyjs.org
- URL
- http://parsleyjs.org/dist/parsley.js
- Domain
- parsleyjs.org
- URL
- http://parsleyjs.org/dist/i18n/fr.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery object| ParsleyConfig object| libphonenumber2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.p2.kenzoken.com/ | Name: laravel_session Value: eyJpdiI6Ilh4UHdyNXhNSHFCMmpyZXBLc2x6MUE9PSIsInZhbHVlIjoiTWVxSGszeTBuVFlQZHdpclFCdjB2TEhtNHh6cjNxN2FvXC9GNEhZTllud3FrRWViZjRFM3NoRG1VdVJXSytrWXoiLCJtYWMiOiJkZDc5ZDg5Y2Y0ZWNjNjYzNTdjZDYzNzk2MmUyNjVkYzdiNzhmNjA2ZmI2ZjY1YTZkNGJjYmM1NDM1NGZmNDE1In0%3D |
|
www.p2.kenzoken.com/ | Name: XSRF-TOKEN Value: eyJpdiI6IkJtWlFocWRKeWsrNlwvN1NmU1BPWE1BPT0iLCJ2YWx1ZSI6InZpeEdqbitQVlF6V3pKYThnWFhRSkw2RGQydG14ckxTd1BqUXFMUFVlak1PR1IxUk0wT3NEd1Zwd205KzRsUHkiLCJtYWMiOiJhZmRkZDViZDE2MTFiM2EzOWQ3NWY1NDAwZGZjNGM0ZDA3NjNhNThhYzVjZmZiMWMyMzdmYWI3NmIwZTUyNjRiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
catamphetamine.github.io
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
parsleyjs.org
www.p2.kenzoken.com
parsleyjs.org
104.161.23.18
185.199.109.153
2001:4de0:ac19::1:b:2a
2606:4700::6810:135e
2a00:1450:4001:802::200a
2a00:1450:4001:81f::2003
016d367c1d57f0f67921da8769b3633fdfdc13ebe9baf4adb492add32c88ee32
22642f202577f0ba2f22cbe56b6cf291a09374487567cd3563e0d2a29f75c0c5
2979f9a6e32fc42c3e7406339ee9fe76b31d1b52059776a02b4a7fa6a4fd280a
3f3a9ecd3b58eb26cce570f9bd3530be1181763b1c823a04f756da3ed8153e43
751133359630858ac3454825f72b1fa6ea1aafddadb444c074e518995ec3bf57
935ad255ea264af7312f898f6d9c991a2ca89139c4e664e13304394a21e1be23
c7d397672ea7ed3c32a686032e91454a478aecbaad31993df15584d6080f10c3
dc103ba8efbb3d56af2d74793ed36e92027ffd00a0381c2738ac03e0c63636e8
eece6e0c65b7007ab0eb1b4998d36dafe381449525824349128efc3f86f4c91c