anazom.c0.ip.5wklf.com
Open in
urlscan Pro
45.10.247.122
Malicious Activity!
Public Scan
Submission: On December 30 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on December 29th 2022. Valid for: 3 months.
This is the only time anazom.c0.ip.5wklf.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online) Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 45.10.247.122 45.10.247.122 | 29470 (RETNNET-AS) (RETNNET-AS) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
5wklf.com
anazom.c0.ip.5wklf.com |
108 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | anazom.c0.ip.5wklf.com |
anazom.c0.ip.5wklf.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
anazom.c0.ip.2czzz.com R3 |
2022-12-29 - 2023-03-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://anazom.c0.ip.5wklf.com/ap/signin.php
Frame ID: 4E58CAB9F576DDB9A5041E9FB97BB71F
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
signin.php
anazom.c0.ip.5wklf.com/ap/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0c79e9da320f45529a3e6546090c8201.css
anazom.c0.ip.5wklf.com/ap/static/css/ |
130 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9ebdfb9b9cba457183a9eee44433802a.css
anazom.c0.ip.5wklf.com/ap/static/css/ |
36 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11pxfkbmcrl.css
anazom.c0.ip.5wklf.com/ap/static/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-style.css
anazom.c0.ip.5wklf.com/ap/static/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
anazom.c0.ip.5wklf.com/ap/static/js/ |
87 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6c7247b40839404aadca53196aba9885.gif
anazom.c0.ip.5wklf.com/ap/static/picture/ |
43 B 247 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pointer.png
anazom.c0.ip.5wklf.com/ap/static/images/ |
181 B 386 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mpgmt0r6ietyiee.png
anazom.c0.ip.5wklf.com/ap/static/images/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
eyzhm86n6zcdpta.png
anazom.c0.ip.5wklf.com/ap/static/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online) Amazon Japan (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
anazom.c0.ip.5wklf.com/ | Name: PHPSESSID Value: p6vj00m4htd3a9r1eo8dr1qrtj |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
anazom.c0.ip.5wklf.com
45.10.247.122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