ickontrol.kuzka.gov.tr
Open in
urlscan Pro
213.238.176.194
Malicious Activity!
Public Scan
Submission: On February 01 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 17th 2024. Valid for: a year.
This is the only time ickontrol.kuzka.gov.tr was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 213.238.176.194 213.238.176.194 | 41683 (EARTH) (EARTH) | |
3 | 2606:4700:303... 2606:4700:3038::6815:eae7 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 139.71.113.91 139.71.113.91 | 6307 (AMERICAN-...) (AMERICAN-EXPRESS) | |
3 | 23.196.241.6 23.196.241.6 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 5 |
ASN41683 (EARTH, TR)
PTR: merkur.sislan.net
ickontrol.kuzka.gov.tr |
ASN6307 (AMERICAN-EXPRESS, US)
PTR: cdaas11.americanexpress.com
cdaas.americanexpress.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-196-241-6.deploy.static.akamaitechnologies.com
www.aexp-static.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
aexp-static.com
www.aexp-static.com — Cisco Umbrella Rank: 13520 |
108 KB |
3 |
githack.com
rawcdn.githack.com — Cisco Umbrella Rank: 61233 |
140 KB |
1 |
americanexpress.com
cdaas.americanexpress.com — Cisco Umbrella Rank: 36060 |
11 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
27 KB |
1 |
kuzka.gov.tr
ickontrol.kuzka.gov.tr |
4 KB |
9 | 5 |
Domain | Requested by | |
---|---|---|
3 | www.aexp-static.com |
rawcdn.githack.com
|
3 | rawcdn.githack.com |
ickontrol.kuzka.gov.tr
|
1 | cdaas.americanexpress.com |
rawcdn.githack.com
|
1 | cdnjs.cloudflare.com |
ickontrol.kuzka.gov.tr
|
1 | ickontrol.kuzka.gov.tr | |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.kuzka.gov.tr Sectigo RSA Domain Validation Secure Server CA |
2024-01-17 - 2025-01-16 |
a year | crt.sh |
githack.com GTS CA 1P5 |
2024-01-02 - 2024-04-01 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
cdaas.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2023-10-11 - 2024-10-09 |
a year | crt.sh |
m.americanexpress.com DigiCert EV RSA CA G2 |
2023-04-05 - 2024-04-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://ickontrol.kuzka.gov.tr/Suite/Web/?QMXwA4qFUrE9wHFBfDA7lKqJLKi2MqBnBdy4aL3s950wd0WuNpb82H5oRfjKI6kdqlV2I7t88GVU9sA64h45yfNT-248de075932dafbab306b3ee8385af
Frame ID: 50DDF4C98782314A718F9D5ADB56A975
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
American Express |Detected technologies
Amex Express Checkout (Payment processors) ExpandDetected patterns
- aexp-static\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ickontrol.kuzka.gov.tr/Suite/Web/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-min.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
285 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-fonts.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
207 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-font.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
104 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amex-desktop-logo.png
cdaas.americanexpress.com/myca/oce/latest/content/images/common/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0fababca-4914-46dd-9b0f-efbd51f67ae8-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
37 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3be50273-0b2e-4aef-ae68-882eacd611f9-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
36 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dls-icons.woff
www.aexp-static.com/cdaas/one/statics/axp-dls/5.10.1/package/dist/iconfont/ |
34 KB 34 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| _0x19d3 function| _0x295cb5 function| _0x55de0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdaas.americanexpress.com
cdnjs.cloudflare.com
ickontrol.kuzka.gov.tr
rawcdn.githack.com
www.aexp-static.com
139.71.113.91
213.238.176.194
23.196.241.6
2606:4700:3038::6815:eae7
2606:4700::6811:180e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