dimano.rs
Open in
urlscan Pro
2a02:250:0:8::54
Malicious Activity!
Public Scan
Effective URL: https://dimano.rs/amz/nen/af446d9d4f5e0474ee0a/Login.php
Submission: On September 10 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by RapidSSL Global TLS RSA4096 SHA256 20... on September 6th 2022. Valid for: a year.
This is the only time dimano.rs was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online) Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2603:1020:2:3... 2603:1020:2:3::1b1 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 2 | 2a00:f60::1:51 2a00:f60::1:51 | 48635 (CLDIN-NL ...) (CLDIN-NL Your.Online) | |
2 4 | 2a02:250:0:8::54 2a02:250:0:8::54 | 39570 (LOOPIA) (LOOPIA) | |
2 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
dimano.rs
2 redirects
dimano.rs |
413 KB |
2 |
decootje.nl
2 redirects
decootje.nl |
163 B |
1 |
verify-kui.com
1 redirects
verify-kui.com |
138 B |
2 | 3 |
Domain | Requested by | |
---|---|---|
4 | dimano.rs |
2 redirects
dimano.rs
|
2 | decootje.nl | 2 redirects |
1 | verify-kui.com | 1 redirects |
2 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dimano.rs RapidSSL Global TLS RSA4096 SHA256 2022 CA1 |
2022-09-06 - 2023-10-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://dimano.rs/amz/nen/af446d9d4f5e0474ee0a/Login.php
Frame ID: D8F79FE3B0147FBC19FA659AA6302EDB
Requests: 7 HTTP requests in this frame
Screenshot
Page Title
AnmeldenPage URL History Show full URLs
-
https://verify-kui.com/
HTTP 302
https://decootje.nl/amz HTTP 301
https://decootje.nl/public/amz/ HTTP 302
https://dimano.rs/amz/nen/ HTTP 302
https://dimano.rs/amz/nen/af446d9d4f5e0474ee0a/ HTTP 302
https://dimano.rs/amz/nen/af446d9d4f5e0474ee0a/Login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://verify-kui.com/
HTTP 302
https://decootje.nl/amz HTTP 301
https://decootje.nl/public/amz/ HTTP 302
https://dimano.rs/amz/nen/ HTTP 302
https://dimano.rs/amz/nen/af446d9d4f5e0474ee0a/ HTTP 302
https://dimano.rs/amz/nen/af446d9d4f5e0474ee0a/Login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Login.php
dimano.rs/amz/nen/af446d9d4f5e0474ee0a/ Redirect Chain
|
164 KB 42 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stam2.css
dimano.rs/amz/nen/COMPONENTS/ |
509 KB 371 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
60 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
64 KB 64 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online) Amazon Japan (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
decootje.nl
dimano.rs
verify-kui.com
2603:1020:2:3::1b1
2a00:f60::1:51
2a02:250:0:8::54
4065b43ba3db8da5390ba0708555889f78e86483fe0226ef79ea22d07c306b89
4b393295bb75165aa49b8683d8ffde45ab78fad038f592275eec495f140f9e44
9cff8fe9e80805510b7b1d0de1d2116bb743ca7d2b645f59e31e3dbcf61b576b
c5e829691be4103e8f645ee962bbc3de1ca51d083d147f1716fbf5d59f99c86a
ccd2b4d3291236165abff9fb9aa683bf00eb4fe676e49532f7db78500cfcbe08
cded49f94fc16dc0a14923975e159fbf4b14844593e612c1342c9e34e2f96821
fae8d9892169edc72006fbc01c8a55c20c98ddd38f1fb927e817d290f398ca92