amaa.co.nz
Open in
urlscan Pro
66.117.5.101
Malicious Activity!
Public Scan
Effective URL: https://amaa.co.nz/c/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75d091681b7e161595ac68616...
Submission: On January 15 via manual from NL
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 12th 2019. Valid for: 3 months.
This is the only time amaa.co.nz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 4 | 66.117.5.101 66.117.5.101 | 22611 (IMH-WEST) (IMH-WEST - InMotion Hosting) | |
1 | 2606:4700::68... 2606:4700::6811:4104 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
1 | 2600:3c01::f0... 2600:3c01::f03c:91ff:fe79:43b | 63949 (LINODE-AP...) (LINODE-AP Linode) | |
4 | 4 |
ASN22611 (IMH-WEST - InMotion Hosting, Inc., US)
PTR: vps28417.inmotionhosting.com
amaa.co.nz |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdnjs.cloudflare.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
amaa.co.nz
2 redirects
amaa.co.nz |
544 KB |
1 |
jsonip.com
jsonip.com |
487 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
73 KB |
4 | 3 |
Domain | Requested by | |
---|---|---|
4 | amaa.co.nz | 2 redirects |
1 | jsonip.com |
cdnjs.cloudflare.com
|
1 | cdnjs.cloudflare.com |
amaa.co.nz
|
4 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
amaa.co.nz cPanel, Inc. Certification Authority |
2019-11-12 - 2020-02-10 |
3 months | crt.sh |
ssl412106.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2019-12-05 - 2020-06-12 |
6 months | crt.sh |
jsonip.com Let's Encrypt Authority X3 |
2019-12-21 - 2020-03-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://amaa.co.nz/c/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75d091681b7e161595ac68616c8c5ae71a4cbf2f3a99636e7e98acf
Frame ID: FEBADD9CF49146373AAD187ED7684721
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://amaa.co.nz/c/ofc
HTTP 301
https://amaa.co.nz/c/ofc/ HTTP 303
https://amaa.co.nz/c/ofc/r.php?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75... Page URL
- https://amaa.co.nz/c/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75d09... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://amaa.co.nz/c/ofc
HTTP 301
https://amaa.co.nz/c/ofc/ HTTP 303
https://amaa.co.nz/c/ofc/r.php?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75d091681b7e161595ac68616c8c5ae71a4cbf2f3a99636e7e98acf Page URL
- https://amaa.co.nz/c/ofc/s/?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75d091681b7e161595ac68616c8c5ae71a4cbf2f3a99636e7e98acf Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://amaa.co.nz/c/ofc HTTP 301
- https://amaa.co.nz/c/ofc/ HTTP 303
- https://amaa.co.nz/c/ofc/r.php?signin=d41d8cd98f00b204e9800998ecf8427e&auth=64f7a6a2e2befea9b75d091681b7e161595ac68616c8c5ae71a4cbf2f3a99636e7e98acf
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
r.php
amaa.co.nz/c/ofc/ Redirect Chain
|
222 B 633 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
amaa.co.nz/c/ofc/s/ |
542 KB 543 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.0.0/ |
257 KB 73 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
383 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
jsonip.com/ |
186 B 487 B |
Script
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| getIPAddress string| x2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amaa.co.nz/ | Name: PHPSESSID Value: 4117487e0c2428dbbfcc51f72cf75c7a |
|
amaa.co.nz/c/ofc/s | Name: ip11 Value: 2a01:4f8:192:5414::2 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amaa.co.nz
cdnjs.cloudflare.com
jsonip.com
2600:3c01::f03c:91ff:fe79:43b
2606:4700::6811:4104
66.117.5.101
21a2ae295d398a017da28484d4c57b8da356a5de9ecd4254088cb4a6a10be989
30faabd76bcdc16eacb8e94d3819e869936429dc3a78ff0fb3b6b5453883297f
7dcf9501780240f07e36f6fde05d8b28ec8a097118309505a14469c6242573b4
82c5759bf4842aebdbfe30eec6264c8c28501266233daa91ba67b877b601f26b
8eb3cb67ef2f0f1b76167135cef6570a409c79b23f0bc0ede71c9a4018f1408a
c7c935b7cfd3d1f36040d1b2bc6339035fce5c0d2f47f0b88c10aef6e1d8ec61
c7e9e2ec5f8c7e440a8b3d2dfed72f0ddfc58ba4fcb9c3ac429ed99389559727