ameozom.animay.cn
Open in
urlscan Pro
211.253.129.200
Malicious Activity!
Public Scan
Effective URL: https://ameozom.animay.cn/pc/Amazonall_signin1.php
Submission Tags: phishing amazon Search All
Submission: On December 21 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on December 20th 2021. Valid for: 3 months.
This is the only time ameozom.animay.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 211.253.129.200 211.253.129.200 | 4766 (KIXS-AS-K...) (KIXS-AS-KR Korea Telecom) | |
7 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
animay.cn
1 redirects
ameozom.animay.cn |
39 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
8 | ameozom.animay.cn |
1 redirects
ameozom.animay.cn
|
7 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.amazon.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ameozom.animay.cn R3 |
2021-12-20 - 2022-03-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ameozom.animay.cn/pc/Amazonall_signin1.php
Frame ID: F9493CC7E79300AB12F6E239CA55A20C
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
AmazonサインインPage URL History Show full URLs
-
https://ameozom.animay.cn/
HTTP 302
https://ameozom.animay.cn/pc/Amazonall_signin1.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
10 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: 利用規約
Search URL Search Domain Scan URL
Title: プライバシー規約
Search URL Search Domain Scan URL
Title: パスワードを忘れた場合
Search URL Search Domain Scan URL
Title: その他のログインに関する問題
Search URL Search Domain Scan URL
Title: Amazonアカウントを作成する
Search URL Search Domain Scan URL
Title: 利用規約
Search URL Search Domain Scan URL
Title: プライバシー規約
Search URL Search Domain Scan URL
Title: ヘルプ
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://ameozom.animay.cn/
HTTP 302
https://ameozom.animay.cn/pc/Amazonall_signin1.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Amazonall_signin1.php
ameozom.animay.cn/pc/ Redirect Chain
|
11 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style3.css
ameozom.animay.cn/pc/Amazonsignin1_files/ |
168 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style2.css
ameozom.animay.cn/pc/Amazonsignin1_files/ |
39 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style1.css
ameozom.animay.cn/pc/Amazonsignin1_files/ |
3 KB 908 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo7.png
ameozom.animay.cn/pc/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sj.png
ameozom.animay.cn/pc/img/ |
174 B 244 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AmazonUIBaseCSS-sprite_jp_1x-f8582354fc42b464ef5eb709dd98f9371d3eafea._V2_.png
ameozom.animay.cn/pc/Amazonsignin1_files/img/ |
264 B 264 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ameozom.animay.cn/ | Name: PHPSESSID Value: 2m0qhcamlmg06suq4i01o5nc37 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ameozom.animay.cn
211.253.129.200
7f2ba0e1bc63dc2f25a423395816d2fb5b35b4db85408a2da44c2c78b43bad25
9bab746fa69defec86842f290759d34b8840e28caea45d5fbafb332d1a9c3ec0
a0a8fe444d2f024caca0fb2ff1132b1201239ea44d7c675a5839b3b7058d9910
bcf1b6c1393473201b637b3d9738fc0ad599a52c7a998379d07ba01d6b75f4a9
e6832d2bd289bbc40bdabb2ea220fa0d2c51985927e77161c74ee5dc9c058a6e
f395d4f7e16a56f78b3ebb62ce61a099e8c6f909bfae191927a20a36b5f6256c
fb2f02617c42dfea5276850408db10979414fb54545c2e995bfe42e2e01e9ff9