www.cengizmakina.com
Open in
urlscan Pro
212.68.42.111
Malicious Activity!
Public Scan
Submission: On February 20 via manual from US — Scanned from US
Summary
TLS certificate: Issued by R3 on December 25th 2023. Valid for: 3 months.
This is the only time www.cengizmakina.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 212.68.42.111 212.68.42.111 | () () | |
3 | 2606:4700:303... 2606:4700:3038::6815:eae6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 139.71.113.91 139.71.113.91 | 6307 (AMERICAN-...) (AMERICAN-EXPRESS) | |
3 | 104.64.215.207 104.64.215.207 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 5 |
ASN6307 (AMERICAN-EXPRESS, US)
PTR: cdaas11.americanexpress.com
cdaas.americanexpress.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-64-215-207.deploy.static.akamaitechnologies.com
www.aexp-static.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
aexp-static.com
www.aexp-static.com — Cisco Umbrella Rank: 13856 |
108 KB |
3 |
githack.com
rawcdn.githack.com — Cisco Umbrella Rank: 69937 |
140 KB |
1 |
americanexpress.com
cdaas.americanexpress.com — Cisco Umbrella Rank: 38806 |
11 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 257 |
27 KB |
1 |
cengizmakina.com
www.cengizmakina.com |
4 KB |
9 | 5 |
Domain | Requested by | |
---|---|---|
3 | www.aexp-static.com |
rawcdn.githack.com
|
3 | rawcdn.githack.com |
www.cengizmakina.com
|
1 | cdaas.americanexpress.com |
rawcdn.githack.com
|
1 | cdnjs.cloudflare.com |
www.cengizmakina.com
|
1 | www.cengizmakina.com | |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cengizmakina.com R3 |
2023-12-25 - 2024-03-24 |
3 months | crt.sh |
githack.com GTS CA 1P5 |
2024-01-02 - 2024-04-01 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
cdaas.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2023-10-11 - 2024-10-09 |
a year | crt.sh |
m.americanexpress.com DigiCert EV RSA CA G2 |
2023-04-05 - 2024-04-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.cengizmakina.com/cv/?OO.cc_id=DISPUTE_ECOM_en_US_202311&OO.cc_t=edm&utm_source=ecom&utm_medium=email&utm_campaign=2910309333-6472222125922823793-GZH
Frame ID: F7838A82A70B663500856DD77CD41280
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
American Express |Detected technologies
Amex Express Checkout (Payment processors) ExpandDetected patterns
- aexp-static\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.cengizmakina.com/cv/ |
11 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-min.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
285 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-fonts.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
207 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-font.css
rawcdn.githack.com/tokenaxp/min/419ad35709f1ea82983b9460c208f1d99fa1f4d5/ |
104 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amex-desktop-logo.png
cdaas.americanexpress.com/myca/oce/latest/content/images/common/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0fababca-4914-46dd-9b0f-efbd51f67ae8-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
37 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3be50273-0b2e-4aef-ae68-882eacd611f9-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
36 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dls-icons.woff
www.aexp-static.com/cdaas/one/statics/axp-dls/5.10.1/package/dist/iconfont/ |
34 KB 34 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| _0x19d3 function| _0x295cb5 function| _0x55de0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdaas.americanexpress.com
cdnjs.cloudflare.com
rawcdn.githack.com
www.aexp-static.com
www.cengizmakina.com
104.64.215.207
139.71.113.91
212.68.42.111
2606:4700:3038::6815:eae6
2606:4700::6811:180e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