www.accountfwq-amezon-upjunginchounjp.buzz
Open in
urlscan Pro
188.213.134.213
Malicious Activity!
Public Scan
Submission Tags: @phishunt_io
Submission: On December 06 via api from ES
Summary
TLS certificate: Issued by R3 on December 5th 2020. Valid for: 3 months.
This is the only time www.accountfwq-amezon-upjunginchounjp.buzz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 188.213.134.213 188.213.134.213 | 44220 (PARFUMURI...) (PARFUMURI-FEMEI-AS) | |
8 | 1 |
ASN44220 (PARFUMURI-FEMEI-AS, RO)
www.accountfwq-amezon-upjunginchounjp.buzz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
accountfwq-amezon-upjunginchounjp.buzz
www.accountfwq-amezon-upjunginchounjp.buzz |
1 MB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | www.accountfwq-amezon-upjunginchounjp.buzz |
www.accountfwq-amezon-upjunginchounjp.buzz
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.accountfwq-amezon-upjunginchounjp.buzz R3 |
2020-12-05 - 2021-03-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.accountfwq-amezon-upjunginchounjp.buzz/
Frame ID: 452CA5689D790467EBB1FC02E7132219
Requests: 8 HTTP requests in this frame
Screenshot
Detected technologies
Lua (Programming Languages) ExpandDetected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
OpenResty (Web Servers) Expand
Detected patterns
- headers server /openresty(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.accountfwq-amezon-upjunginchounjp.buzz/ |
552 B 796 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.9083bf77c184148c87c8e29028c5c822.css
www.accountfwq-amezon-upjunginchounjp.buzz/static/css/ |
5 MB 1015 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
manifest.da48155ae07325978d7b.js
www.accountfwq-amezon-upjunginchounjp.buzz/static/js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.00855857305fee9acfa3.js
www.accountfwq-amezon-upjunginchounjp.buzz/static/js/ |
234 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.26bd2427ef62ce7eb699.js
www.accountfwq-amezon-upjunginchounjp.buzz/static/js/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
16.a7b1a8e2e4d22b4a609c.js
www.accountfwq-amezon-upjunginchounjp.buzz/static/js/ |
604 B 861 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jump.php
www.accountfwq-amezon-upjunginchounjp.buzz/api/ |
0 666 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
17.4b106a949f60009b594b.js
www.accountfwq-amezon-upjunginchounjp.buzz/static/js/ |
439 B 696 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.accountfwq-amezon-upjunginchounjp.buzz
188.213.134.213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