amazewa.kfdginr1.xyz
Open in
urlscan Pro
204.44.92.140
Malicious Activity!
Public Scan
Submission: On February 26 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 25th 2022. Valid for: 3 months.
This is the only time amazewa.kfdginr1.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 204.44.92.140 204.44.92.140 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
8 | 1 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
PTR: 204.44.92.140.static.quadranet.com
amazewa.kfdginr1.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
kfdginr1.xyz
amazewa.kfdginr1.xyz |
721 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | amazewa.kfdginr1.xyz |
amazewa.kfdginr1.xyz
|
8 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
amazewa.kfdginr1.xyz R3 |
2022-02-25 - 2022-05-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://amazewa.kfdginr1.xyz/
Frame ID: 8649FA530A2E36215D596CB81D7FB151
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
amazewa.kfdginr1.xyz/ |
546 B 456 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.752839d3f58c010ecc04f48dcc063497.css
amazewa.kfdginr1.xyz/static/css/ |
4 MB 635 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
manifest.dd091f32d078ce1ae228.js
amazewa.kfdginr1.xyz/static/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.8942a87b5a70d06cf6ea.js
amazewa.kfdginr1.xyz/static/js/ |
233 KB 82 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.75f405b5d5d325e145c9.js
amazewa.kfdginr1.xyz/static/js/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.67434be2e9f5b166bccc.js
amazewa.kfdginr1.xyz/static/js/ |
861 B 619 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
amazewa.kfdginr1.xyz/api/ |
0 224 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
15.5a2aef89a62e11d95a50.js
amazewa.kfdginr1.xyz/static/js/ |
504 B 419 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amazewa.kfdginr1.xyz/ | Name: PHPSESSID Value: hn316o6g3irl8naganu9802010 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amazewa.kfdginr1.xyz
204.44.92.140
0513d8992332fdf3e4a5f304f09e75396c36a6aedd8d34415b8ea766486d3db9
1f940df454ae24dce204417bc1652b54a5928fa332ae82c5a54c61d894fd8fec
6c50f985c2845801ce0ffab24e6ddf480b9517c2afd3c9cd134adac45e8ffabd
b0dec2cd2d40cd0cc411b987973a8ccc02e590ef698c2dbc505a1c598fc3b5f0
c43b23d310db6bb3074b6ed2b635cc34fe322a4245352da21de3bd388103c50f
dd49eb3cdcd3de9fbf684dba385a4ac0d5dd3be2847e25474a9508b967ac28f8
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e6be99ea2c533ddca872535bb6fbc4d45ad36b5e3f6c24e133bf1e45b003ce26