annzon-isdlfj-co-jp.xbsto.buzz
Open in
urlscan Pro
173.82.186.156
Malicious Activity!
Public Scan
Effective URL: https://annzon-isdlfj-co-jp.xbsto.buzz/
Submission Tags: 7276637
Submission: On August 29 via api from NL
Summary
TLS certificate: Issued by R3 on August 29th 2021. Valid for: 3 months.
This is the only time annzon-isdlfj-co-jp.xbsto.buzz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 240e:944:1:e0... 240e:944:1:e00:3::3fb | 58541 (CHINATELE...) (CHINATELECOM-SHANDONG-QINGDAO-IDC Qingdao) | |
8 | 173.82.186.156 173.82.186.156 | 35916 (MULTA-ASN1) (MULTA-ASN1) | |
8 | 1 |
ASN58541 (CHINATELECOM-SHANDONG-QINGDAO-IDC Qingdao,266000, CN)
mtw.so |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
xbsto.buzz
annzon-isdlfj-co-jp.xbsto.buzz |
1 MB |
1 |
mtw.so
1 redirects
mtw.so |
958 B |
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | annzon-isdlfj-co-jp.xbsto.buzz |
annzon-isdlfj-co-jp.xbsto.buzz
|
1 | mtw.so | 1 redirects |
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
annzon-isdlfj-co-jp.xbsto.buzz R3 |
2021-08-29 - 2021-11-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://annzon-isdlfj-co-jp.xbsto.buzz/
Frame ID: A5126AB4CA55FC91348F52F7631E7261
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
errorPage URL History Show full URLs
-
http://mtw.so/63UauY
HTTP 302
https://annzon-isdlfj-co-jp.xbsto.buzz/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mtw.so/63UauY
HTTP 302
https://annzon-isdlfj-co-jp.xbsto.buzz/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
annzon-isdlfj-co-jp.xbsto.buzz/ Redirect Chain
|
543 B 696 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.a083b19784018e81fcc143606849bc10.css
annzon-isdlfj-co-jp.xbsto.buzz/static/css/ |
5 MB 971 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
manifest.07fd13d8ea3a852877c4.js
annzon-isdlfj-co-jp.xbsto.buzz/static/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.02b6079c6f04970cea07.js
annzon-isdlfj-co-jp.xbsto.buzz/static/js/ |
237 KB 93 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.f7ac6721c69b037677cc.js
annzon-isdlfj-co-jp.xbsto.buzz/static/js/ |
8 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
16.a8d9fd5ffa4218ce34c1.js
annzon-isdlfj-co-jp.xbsto.buzz/static/js/ |
763 B 976 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
annzon-isdlfj-co-jp.xbsto.buzz/api/ |
0 322 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
17.150b4c16f94bbd714fdf.js
annzon-isdlfj-co-jp.xbsto.buzz/static/js/ |
462 B 675 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)22 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
annzon-isdlfj-co-jp.xbsto.buzz
mtw.so
173.82.186.156
240e:944:1:e00:3::3fb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