d10yke8mddzjba.cloudfront.net Open in urlscan Pro
18.244.14.98  Malicious Activity! Public Scan

Submitted URL: http://d10yke8mddzjba.cloudfront.net/
Effective URL: https://d10yke8mddzjba.cloudfront.net/
Submission: On March 03 via api from PL — Scanned from PL

Form analysis 1 forms found in the DOM

GET /errors/validateCaptcha

<form method="get" action="/errors/validateCaptcha" name="">
  <input type="hidden" name="amzn" value="3YFAyk5R7N14PWT6LZIHtQ=="><input type="hidden" name="amzn-r" value="/">
  <div class="a-row a-spacing-large">
    <div class="a-box">
      <div class="a-box-inner">
        <h4>Type the characters you see in this image:</h4>
        <div class="a-row a-text-center">
          <img src="https://images-na.ssl-images-amazon.com/captcha/nzwwotmg/Captcha_tsbawyqshg.jpg">
        </div>
        <div class="a-row a-spacing-base">
          <div class="a-row">
            <div class="a-column a-span6">
              <label for="captchacharacters">Type characters</label>
            </div>
            <div class="a-column a-span6 a-span-last a-text-right">
              <a onclick="window.location.reload()">Try different image</a>
            </div>
          </div>
          <input autocomplete="off" spellcheck="false" id="captchacharacters" name="field-keywords" class="a-span12" autocapitalize="off" autocorrect="off" type="text">
        </div>
      </div>
    </div>
  </div>
  <div class="a-section a-spacing-extra-large">
    <div class="a-row">
      <span class="a-button a-button-primary a-span12">
        <span class="a-button-inner">
          <button type="submit" class="a-button-text">Continue shopping</button>
        </span>
      </span>
    </div>
  </div>
</form>

Text Content

SERVER BUSY

Our servers are getting hit pretty hard right now. To continue shopping, enter
the characters as they are shown in the image below.

TYPE THE CHARACTERS YOU SEE IN THIS IMAGE:


Type characters
Try different image
Continue shopping

© 1996-2014, Amazon.com, Inc. or its affiliates