www.p2.kenzoken.com
Open in
urlscan Pro
104.161.23.18
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On October 25 via api from US
Summary
This is the only time www.p2.kenzoken.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 104.161.23.18 104.161.23.18 | 53755 (IOFLOOD) (IOFLOOD) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 185.199.108.153 185.199.108.153 | 54113 (FASTLY) (FASTLY) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:81f::2003 | 15169 (GOOGLE) (GOOGLE) | |
11 | 7 |
ASN53755 (IOFLOOD, US)
PTR: corporate.vip2.noc401.com
www.p2.kenzoken.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
gstatic.com
fonts.gstatic.com |
27 KB |
2 |
parsleyjs.org
parsleyjs.org |
25 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
29 KB |
2 |
kenzoken.com
www.p2.kenzoken.com |
9 KB |
1 |
github.io
catamphetamine.github.io |
37 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
26 KB |
1 |
googleapis.com
fonts.googleapis.com |
689 B |
11 | 7 |
Domain | Requested by | |
---|---|---|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | parsleyjs.org |
www.p2.kenzoken.com
|
2 | maxcdn.bootstrapcdn.com |
www.p2.kenzoken.com
|
2 | www.p2.kenzoken.com |
www.p2.kenzoken.com
|
1 | catamphetamine.github.io |
www.p2.kenzoken.com
|
1 | cdnjs.cloudflare.com |
www.p2.kenzoken.com
|
1 | fonts.googleapis.com |
www.p2.kenzoken.com
|
11 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
www.github.com DigiCert SHA2 High Assurance Server CA |
2020-05-06 - 2022-04-14 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.p2.kenzoken.com/
Frame ID: DF9208AD2BB02B45C58118C7BA2713E9
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
www.p2.kenzoken.com/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
4 KB 689 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.4/ |
82 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pp.png
www.p2.kenzoken.com/public/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
parsley.js
parsleyjs.org/dist/ |
93 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fr.js
parsleyjs.org/dist/i18n/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
libphonenumber-js.min.js
catamphetamine.github.io/libphonenumber-js/ |
135 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
XRXW3I6Li01BKofA6sKUYevIWzgPDA.woff2
fonts.gstatic.com/s/nunito/v14/ |
14 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-Q050 |
XRXW3I6Li01BKofA-seUYevIWzgPDA.woff2
fonts.gstatic.com/s/nunito/v14/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| $ function| jQuery object| ParsleyConfig object| ParsleyExtend object| psly object| Parsley object| ParsleyUtils object| ParsleyValidator object| ParsleyUI string| inputEventPatched object| parsley object| libphonenumber0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
catamphetamine.github.io
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
parsleyjs.org
www.p2.kenzoken.com
104.161.23.18
185.199.108.153
2001:4de0:ac19::1:b:2b
2606:4700::6810:135e
2a00:1450:4001:801::200a
2a00:1450:4001:808::2003
2a00:1450:4001:81f::2003
016d367c1d57f0f67921da8769b3633fdfdc13ebe9baf4adb492add32c88ee32
22642f202577f0ba2f22cbe56b6cf291a09374487567cd3563e0d2a29f75c0c5
2979f9a6e32fc42c3e7406339ee9fe76b31d1b52059776a02b4a7fa6a4fd280a
31ee6c92b3d0820e352b79c431f7df828550f2e2da21870a5ce268ba3f033291
3f3a9ecd3b58eb26cce570f9bd3530be1181763b1c823a04f756da3ed8153e43
751133359630858ac3454825f72b1fa6ea1aafddadb444c074e518995ec3bf57
753697b112e342eeb2e099fde0a75425a8ad77cf2d72902033e052d18bd51ca2
935ad255ea264af7312f898f6d9c991a2ca89139c4e664e13304394a21e1be23
be43eddbeae875bbc9b68f4a6a95de3fad6798b733dd55f2cdc2bf81a5a33848
c7d397672ea7ed3c32a686032e91454a478aecbaad31993df15584d6080f10c3
eece6e0c65b7007ab0eb1b4998d36dafe381449525824349128efc3f86f4c91c