www.ao6v4o.cfd
Open in
urlscan Pro
47.251.1.25
Malicious Activity!
Public Scan
Effective URL: https://www.ao6v4o.cfd/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.com%2F%3Fref_%3Dn...
Submission Tags: @ecarlesi threat phishing amazon Search All
Submission: On March 16 via api from IT — Scanned from IT
Summary
TLS certificate: Issued by R3 on March 16th 2024. Valid for: 3 months.
This is the only time www.ao6v4o.cfd was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:303... 2606:4700:3034::6815:1424 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 17 | 47.251.1.25 47.251.1.25 | 45102 (ALIBABA-C...) (ALIBABA-CN-NET Alibaba US Technology Co.) | |
1 | 2a00:1450:400... 2a00:1450:4001:813::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a04:4e42::272 2a04:4e42::272 | 54113 (FASTLY) (FASTLY) | |
1 | 2600:9000:249... 2600:9000:2490:d000:3:12d0:8d40:21 | 16509 (AMAZON-02) (AMAZON-02) | |
20 | 5 |
ASN45102 (ALIBABA-CN-NET Alibaba US Technology Co., Ltd., CN)
www.ao6v4o.cfd | |
images-na.ao6v4o.cfd | |
fls-na.ao6v4o.cfd |
ASN16509 (AMAZON-02, US)
d35uxhjf90umnp.cloudfront.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
ao6v4o.cfd
1 redirects
www.ao6v4o.cfd images-na.ao6v4o.cfd fls-na.ao6v4o.cfd m.ao6v4o.cfd Failed |
2 MB |
1 |
cloudfront.net
d35uxhjf90umnp.cloudfront.net |
12 KB |
1 |
media-amazon.com
m.media-amazon.com — Cisco Umbrella Rank: 510 |
28 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 390 |
31 KB |
1 |
2q2t8v7.co
1 redirects
2q2t8v7.co |
675 B |
20 | 5 |
Domain | Requested by | |
---|---|---|
13 | images-na.ao6v4o.cfd |
www.ao6v4o.cfd
|
2 | fls-na.ao6v4o.cfd |
www.ao6v4o.cfd
|
2 | www.ao6v4o.cfd | 1 redirects |
1 | d35uxhjf90umnp.cloudfront.net |
images-na.ao6v4o.cfd
|
1 | m.media-amazon.com |
images-na.ao6v4o.cfd
|
1 | ajax.googleapis.com |
www.ao6v4o.cfd
|
1 | 2q2t8v7.co | 1 redirects |
0 | m.ao6v4o.cfd Failed |
www.ao6v4o.cfd
|
20 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ao6v4o.cfd R3 |
2024-03-16 - 2024-06-14 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-02-19 - 2024-05-13 |
3 months | crt.sh |
images-na.ssl-images-amazon.com DigiCert Global CA G2 |
2023-09-08 - 2024-06-21 |
9 months | crt.sh |
*.cloudfront.net Amazon RSA 2048 M01 |
2023-10-10 - 2024-09-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.ao6v4o.cfd/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.com%2F%3Fref_%3Dnav_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=usflex&openid.mode=checkid_setup&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&
Frame ID: 6B1F741B241AA399F9CDA3CC8887C613
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
Amazon Sign-InPage URL History Show full URLs
-
http://2q2t8v7.co/
HTTP 301
https://www.ao6v4o.cfd/XSfG HTTP 302
https://www.ao6v4o.cfd/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amaz... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://2q2t8v7.co/
HTTP 301
https://www.ao6v4o.cfd/XSfG HTTP 302
https://www.ao6v4o.cfd/ap/signin?openid.pape.max_auth_age=0&openid.return_to=https%3A%2F%2Fwww.amazon.com%2F%3Fref_%3Dnav_signin&openid.identity=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.assoc_handle=usflex&openid.mode=checkid_setup&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0& Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
signin
www.ao6v4o.cfd/ap/ Redirect Chain
|
110 KB 112 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.0/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
61A6IErPNXL._RC%7C11Fd9tJOdtL.css,11tfezETfFL.css,31Q3id-QR0L.css,31U9HrBLKmL.css_.css
images-na.ao6v4o.cfd/images/I/ |
133 KB 134 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
01SdjaY0ZsL._RC%7C31jdWD+JB+L.css,51ndJ60shfL.css_.css
images-na.ao6v4o.cfd/images/I/ |
57 KB 58 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
21PFuszay6L.css
images-na.ao6v4o.cfd/images/I/ |
4 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ATVPDKIKX0DER:141-7738780-9108604:1J44DEGHZ8MTQD8NSQ0T$uedata=s:%2Fap%2Fuedata%3Fstaticb%26id%3D1J44DEGHZ8MTQD8NSQ0T:0
fls-na.ao6v4o.cfd/1/batch/1/OP/ |
43 B 238 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
61yXDIPmT-L._RC%7C11Y+5x+kkTL.js,51KMV3Cz2XL.js,31x4ENTlVIL.js,31f4+QIEeqL.js,01N6xzIJxbL.js,518BI433aLL.js,01rpauTep4L.js,31QZSjMuoeL.js,61ofwvddDeL.js,01KsMxlPtzL.js_.js
images-na.ao6v4o.cfd/images/I/ |
310 KB 311 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
21ZMwVh4T0L._RC%7C21OJDARBhQL.js,218GJg15I8L.js,31lucpmF4CL.js,2119M3Ks9rL.js,611j-QbgQLL.js_.js
images-na.ao6v4o.cfd/images/I/ |
105 KB 106 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
01wGDSlxwdL.js
images-na.ao6v4o.cfd/images/I/ |
521 B 1 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
41ZBxpOecEL.js
images-na.ao6v4o.cfd/images/I/ |
20 KB 21 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8135BpGZX3L.js
images-na.ao6v4o.cfd/images/I/ |
323 KB 324 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
31jdfgcsPAL.js
images-na.ao6v4o.cfd/images/I/ |
14 KB 15 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
715WP4XHc5L.js
images-na.ao6v4o.cfd/images/I/ |
174 KB 175 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
51Xm0KLvSZL.js
images-na.ao6v4o.cfd/images/I/ |
58 KB 59 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8177uTcYaeL.js
images-na.ao6v4o.cfd/images/I/ |
257 KB 258 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
A1bfdSKFkcL.js
images-na.ao6v4o.cfd/images/I/ |
176 KB 0 |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
showads.v2.js
m.ao6v4o.cfd/images/G/01/csm/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mPGmT0r6IeTyIee.png
m.media-amazon.com/images/S/sash/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.js
d35uxhjf90umnp.cloudfront.net/ |
37 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
fls-na.ao6v4o.cfd/1/batch/1/OE/ |
0 316 B |
Ping
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- m.ao6v4o.cfd
- URL
- https://m.ao6v4o.cfd/images/G/01/csm/showads.v2.js?ad_size=-ad-util-&adstype=-ad-sidebar-&advertiser=-ad-banner-
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)83 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| ue_t0 object| ue_csm number| ue_hob string| ue_err_chan string| ue_id string| ue_url number| ue_navtiming string| ue_mid string| ue_sid string| ue_sn string| ue_furl string| ue_surl number| ue_int number| ue_fcsn number| ue_urt string| ue_rpl_ns number| ue_ddq string| ue_fpf number| ue_sbuimp number| ue_ibft number| ue_fnt number| ue_swi function| ue_viz number| ue_hoe number| ue_ihb object| ue function| ueLogError object| ue_err number| ueinit function| uei function| ueh function| ues function| uet function| uex function| onLd function| onLdEnd function| onUl function| onstop number| aPageStart number| ue_ihe function| csa object| app object| amzn function| cf object| metadataList object| input object| authenticationFormList number| index object| fwcimCmd boolean| acicActionType boolean| acicShouldSetup function| acicEventListener function| submitForm function| setAAToken function| getClientContext function| getFwcimBlob function| getEmailAddress function| isTestEmailPattern object| ue_mbl string| ue_pty string| ue_spty number| ue_adb number| ue_adb_rtla number| ue_wtc_c string| ue_aa_a number| ue_ibe function| _uess number| ue_fadb function| ue_isAdb object| ue_utils number| ue_unrt object| jQuery16408063981871717945 boolean| loginWithOTPState string| updatedHtml object| regeneratorRuntime object| SiegeCrypto function| setImmediate function| clearImmediate number| __fwcimLoaded object| fwcim object| pie5 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.ao6v4o.cfd/ | Name: WFoJ Value: 9d094e662ffb777038d182eb54ccd8e7d97d305f9ce4a2fae8319b6e7d92d526 |
|
.ao6v4o.cfd/ | Name: session-id Value: 141-7738780-9108604 |
|
.ao6v4o.cfd/ | Name: session-id-time Value: 2341326160l |
|
www.ao6v4o.cfd/ | Name: csm-hit Value: tb:s-1J44DEGHZ8MTQD8NSQ0T|1710606164036&t:1710606164036 |
|
www.ao6v4o.cfd/ | Name: id_pkel Value: n0 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
2q2t8v7.co
ajax.googleapis.com
d35uxhjf90umnp.cloudfront.net
fls-na.ao6v4o.cfd
images-na.ao6v4o.cfd
m.ao6v4o.cfd
m.media-amazon.com
www.ao6v4o.cfd
m.ao6v4o.cfd
2600:9000:2490:d000:3:12d0:8d40:21
2606:4700:3034::6815:1424
2a00:1450:4001:813::200a
2a04:4e42::272
47.251.1.25
0cde4688360fafb54b1e49f3e53c6d2e4b26b27e947e187fde2937759343598f
208fc08aa371ccc5762f46e2888f39133a056f1cb1f9054a11009b843622eeef
2e5c4e5dd76d19bd957864a5485880b7dd5381be31835dc30dbb276d82652a89
432dff2bd6f663c6151a5947fa318a46463085d4f6e40761450e8b38fd0fe938
437e95a363a4291060e34ba170e043274e0155821e9be374f35de3c4f13cbaa5
6267b22c78747f8db9476b502c900e874aebf89e1c658b5b3282f4c01f7a54c2
65e3ba66df0c9c45a17ac62283069d21d5e4a473d649a1d574a562a44f9a09c3
6734d4bcfc888eb3fc6f1658fdb82ea5266efaaa8107f3415a568eb4e9c2b2af
940cab6b7e6da2f4b437e516e861d17dbb54d695c2d0cacff08d9d0f5fb9fbb8
9494b5f25ab38baf3668843af019a487f87e05c9cb51694967be69ccb86d20c8
9741b8fcee135784a67c89f65aa8cd2d706e77ae27dcc9e0614cd183917494cc
a36d49dc5c41b3325b439294b31b3c12ec8a322674ebfd86292e60d3ba44749d
a3a64aea2e96ec58a163ddb8d4cf86cf236178ed2d225b8f44154bc1b010ddce
c8ec5275fbf30d4ba5aae552cddc6f8abdfc6bc202abb697688a6c1dc7a2f797
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ef952a9b26aac9ba1c072104f6ce65f8ceb2ba3e5f9a03eeffe4d3f36374ab38
fccb6bdf1465e9629f69a143ab791809b9686cbe35bbe6466c2498024fae1c9c
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e