sazxvjyusv7axbnnasf.zxvzjkxkv12.com
Open in
urlscan Pro
69.49.230.104
Malicious Activity!
Public Scan
Submission: On December 29 via automatic, source openphish — Scanned from DE
Summary
This is the only time sazxvjyusv7axbnnasf.zxvzjkxkv12.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Coinbase (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 69.49.230.104 69.49.230.104 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
5 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: dmms.brainminetech.com
sazxvjyusv7axbnnasf.zxvzjkxkv12.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
zxvzjkxkv12.com
sazxvjyusv7axbnnasf.zxvzjkxkv12.com |
206 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
5 | sazxvjyusv7axbnnasf.zxvzjkxkv12.com |
sazxvjyusv7axbnnasf.zxvzjkxkv12.com
|
5 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.coinbase.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://sazxvjyusv7axbnnasf.zxvzjkxkv12.com/login
Frame ID: 611E4292862E2FA8678B20207D4CB469
Requests: 5 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
sazxvjyusv7axbnnasf.zxvzjkxkv12.com/ |
16 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.css
sazxvjyusv7axbnnasf.zxvzjkxkv12.com/assets/css/ |
64 KB 65 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
sazxvjyusv7axbnnasf.zxvzjkxkv12.com/assets/js/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.js
sazxvjyusv7axbnnasf.zxvzjkxkv12.com/assets/js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
graphik-font.woff2
sazxvjyusv7axbnnasf.zxvzjkxkv12.com/assets/css/ |
36 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Coinbase (Crypto Exchange)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| rand string| key0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sazxvjyusv7axbnnasf.zxvzjkxkv12.com
69.49.230.104
80094c63e34cab8e70a9b5a7faf9c271c392443a3ca8f0ac1726a6b05ec04ab1
aeabadfcbec89b7a55d9a65893d93f275b406984811f8236b60bc9d9a7653360
b921a418d57a92691822a70bb79c184ef6e0836cf481eb26727570211c4b3ae8
ed27f18d2e892280bef52d6f6ba11ff5d7d28bf0df0c33c3d4f80e185fc1bc9c
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d