sec.cvzmailsecureapplockcbamazon.com
Open in
urlscan Pro
162.240.46.158
Malicious Activity!
Public Scan
Effective URL: http://sec.cvzmailsecureapplockcbamazon.com/login
Submission: On January 17 via api from US — Scanned from DE
Summary
This is the only time sec.cvzmailsecureapplockcbamazon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Coinbase (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 162.240.46.158 162.240.46.158 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
5 | 101.50.1.56 101.50.1.56 | 55688 (BEON-AS-I...) (BEON-AS-ID PT. Beon Intermedia) | |
3 | 2a00:1450:400... 2a00:1450:4001:810::2003 | 15169 (GOOGLE) (GOOGLE) | |
17 | 5 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 5636267.bonekacan.net
sec.cvzmailsecureapplockcbamazon.com |
ASN55688 (BEON-AS-ID PT. Beon Intermedia, ID)
PTR: blitz.jagoanhosting.com
fuckmyrep.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cvzmailsecureapplockcbamazon.com
sec.cvzmailsecureapplockcbamazon.com |
196 KB |
5 |
fuckmyrep.com
fuckmyrep.com |
36 KB |
3 |
gstatic.com
fonts.gstatic.com |
126 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 47 |
2 KB |
17 | 4 |
Domain | Requested by | |
---|---|---|
6 | sec.cvzmailsecureapplockcbamazon.com |
sec.cvzmailsecureapplockcbamazon.com
|
5 | fuckmyrep.com |
sec.cvzmailsecureapplockcbamazon.com
fuckmyrep.com |
3 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
sec.cvzmailsecureapplockcbamazon.com
|
17 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.coinbase.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1C3 |
2021-12-08 - 2022-03-02 |
3 months | crt.sh |
fuckmyrep.com cPanel, Inc. Certification Authority |
2022-01-16 - 2022-04-16 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-12-08 - 2022-03-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://sec.cvzmailsecureapplockcbamazon.com/login
Frame ID: 9AC0923CA3784828782A8773A6172459
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Sign In - CoinbasePage URL History Show full URLs
- http://sec.cvzmailsecureapplockcbamazon.com/ Page URL
- http://sec.cvzmailsecureapplockcbamazon.com/login Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://sec.cvzmailsecureapplockcbamazon.com/ Page URL
- http://sec.cvzmailsecureapplockcbamazon.com/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
sec.cvzmailsecureapplockcbamazon.com/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
43 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
fuckmyrep.com/assets/vendor/bootstrap/css/ |
160 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-icons.css
fuckmyrep.com/assets/vendor/bootstrap-icons/ |
64 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
fuckmyrep.com/assets/vendor/simple-datatables/ |
3 KB 716 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
fuckmyrep.com/assets/css/ |
21 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
not-found.svg
fuckmyrep.com/assets/img/ |
7 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XRXV3I6Li01BKofINeaB.woff2
fonts.gstatic.com/s/nunito/v20/ |
35 KB 35 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v27/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bootstrap-icons.woff2
fuckmyrep.com/assets/vendor/bootstrap-icons/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
fonts.gstatic.com/s/opensans/v27/ |
47 KB 47 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login
sec.cvzmailsecureapplockcbamazon.com/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bootstrap-icons.woff
fuckmyrep.com/assets/vendor/bootstrap-icons/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.css
sec.cvzmailsecureapplockcbamazon.com/assets/css/ |
64 KB 65 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
sec.cvzmailsecureapplockcbamazon.com/assets/js/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signin.js
sec.cvzmailsecureapplockcbamazon.com/assets/js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
graphik-font.woff2
sec.cvzmailsecureapplockcbamazon.com/assets/css/ |
36 KB 36 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fuckmyrep.com
- URL
- https://fuckmyrep.com/assets/vendor/bootstrap-icons/fonts/bootstrap-icons.woff2?856008caa5eb66df68595e734e59580d
- Domain
- fuckmyrep.com
- URL
- https://fuckmyrep.com/assets/vendor/bootstrap-icons/fonts/bootstrap-icons.woff?856008caa5eb66df68595e734e59580d
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Coinbase (Crypto Exchange)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| rand string| key1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sec.cvzmailsecureapplockcbamazon.com/ | Name: PHPSESSID Value: 00a7b81d9132b9f7579594d2f271fda8 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
fuckmyrep.com
sec.cvzmailsecureapplockcbamazon.com
fuckmyrep.com
101.50.1.56
162.240.46.158
2a00:1450:4001:810::2003
2a00:1450:4001:810::200a
1a3a70c8041f5eece7640e7f4f6a03e4a5a7c51ae6530ced2d882f312a00253f
3c325075337b768950583012228055ae392e384688d77ec5235e6ca88dcec6ef
630c8d0dacb9cc32c0df6c97f4b25bf2f6dae4dcda2a0988a2e11215d66f1bf5
65eacc8d7f8fa13c11df7b2b941958b5e1b63304c15058a6a69e30713d70fe58
79e76aa9bffdc6edcc0e27e79d12f1f77d9bf7ee1650c0dd60085c421d91994f
80094c63e34cab8e70a9b5a7faf9c271c392443a3ca8f0ac1726a6b05ec04ab1
aeabadfcbec89b7a55d9a65893d93f275b406984811f8236b60bc9d9a7653360
bd558b6b0fa8256504d6f1796203c55c540013d7d4021f79241476f3ac49dac1
e1b598509a4c9ae5c9dc025465905bb9633403aa77a8b78c049d16e7f01b87a2
ed27f18d2e892280bef52d6f6ba11ff5d7d28bf0df0c33c3d4f80e185fc1bc9c
ee5331e9d66acd87f8089f4a404dfeddb891c0eadc5439e3bc107099e080c43b
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d