amazonamazonzz.elementfx.com
Open in
urlscan Pro
198.91.81.3
Malicious Activity!
Public Scan
Effective URL: http://amazonamazonzz.elementfx.com/
Submission: On September 03 via manual from US
Summary
This is the only time amazonamazonzz.elementfx.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 67.199.248.10 67.199.248.10 | 395224 (BITLY-AS) (BITLY-AS - Bitly Inc) | |
1 | 198.91.81.3 198.91.81.3 | 32475 (SINGLEHOP...) (SINGLEHOP-LLC - SingleHop LLC) | |
6 | 45.76.182.19 45.76.182.19 | 20473 (AS-CHOOPA) (AS-CHOOPA - Choopa) | |
7 | 2 |
ASN32475 (SINGLEHOP-LLC - SingleHop LLC, US)
PTR: xo3.x10hosting.com
amazonamazonzz.elementfx.com |
ASN20473 (AS-CHOOPA - Choopa, LLC, US)
PTR: 45.76.182.19.vultr.com
45.76.182.19 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
elementfx.com
amazonamazonzz.elementfx.com |
3 KB |
1 |
bit.ly
1 redirects
bit.ly |
429 B |
7 | 2 |
Domain | Requested by | |
---|---|---|
1 | amazonamazonzz.elementfx.com | |
1 | bit.ly | 1 redirects |
7 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
45.77.32.109 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://amazonamazonzz.elementfx.com/
Frame ID: 1B85BA73031202C99264CE70AA63CB64
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bit.ly/2lRg63F
HTTP 301
http://amazonamazonzz.elementfx.com/ Page URL
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: パスワード
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bit.ly/2lRg63F
HTTP 301
http://amazonamazonzz.elementfx.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
amazonamazonzz.elementfx.com/ Redirect Chain
|
40 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.min.css
45.76.182.19/static/css/ |
141 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
45.76.182.19/static/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.9.1.min.js
45.76.182.19/static/js/ |
90 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.cookie.js
45.76.182.19/static/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.min.js
45.76.182.19/static/js/ |
48 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amazonui.png
45.76.182.19/static/images/ |
55 KB 55 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon Japan (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery undefined| amazurl1 function| atartt object| bootstrap object| jQuery1910283512934596280351 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amazonamazonzz.elementfx.com/ | Name: amazurl Value: https%3A%2F%2Fwww.amazon.co.jp |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amazonamazonzz.elementfx.com
bit.ly
198.91.81.3
45.76.182.19
67.199.248.10
7dd1361f3b89a8b7b26b0335602d759bd9cf2e892f64c7c86bdf30d922c14483
8b0107d2d86b4230245431d8cd35750d1196ad19f33554a765ac491114299b41
a3b19878ecde789678c69e02240630e0d8c4d62653fd3ef33f53748bdfe12b55
b84161c9fbf7520cd14e7019f92120bd87a928a074156e91a992eba9fc9436e8
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
c4b6ed2645519ec2c128badb2a2e7720052f8441ffa94c4f0bceca02311004da
d452b27e9349bbd59d48f7dba33782b8fe9a46b85c172a007ffbde4a1093d8e4