Submitted URL: http://degp.cc/G3G5
Effective URL: https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifie...
Submission Tags: phishing amazon Search All
Submission: On March 18 via api from JP — Scanned from JP

Summary

This website contacted 4 IPs in 3 countries across 5 domains to perform 6 HTTP transactions. The main IP is 45.156.27.249, located in Russian Federation and belongs to CLOUDBACKBONE, HK. The main domain is pasnftsa.qpoe.com.
TLS certificate: Issued by R3 on March 18th 2023. Valid for: 3 months.
This is the only time pasnftsa.qpoe.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 104.238.161.13 20473 (AS-CHOOPA)
1 172.67.212.134 13335 (CLOUDFLAR...)
2 5 45.156.27.249 56971 (CLOUDBACK...)
1 216.58.220.106 ()
1 172.217.175.227 ()
6 4
Apex Domain
Subdomains
Transfer
5 qpoe.com
pasnftsa.qpoe.com
5 KB
1 gstatic.com
fonts.gstatic.com
46 KB
1 googleapis.com
fonts.googleapis.com
954 B
1 workers.dev
rough-dust-4008.7e-sk9r8.workers.dev
523 B
1 degp.cc
degp.cc
223 B
6 5
Domain Requested by
5 pasnftsa.qpoe.com 2 redirects rough-dust-4008.7e-sk9r8.workers.dev
pasnftsa.qpoe.com
1 fonts.gstatic.com fonts.googleapis.com
1 fonts.googleapis.com pasnftsa.qpoe.com
1 rough-dust-4008.7e-sk9r8.workers.dev
1 degp.cc 1 redirects
6 5

This site contains no links.

Subject Issuer Validity Valid
*.7e-sk9r8.workers.dev
GTS CA 1P5
2023-03-15 -
2023-06-13
3 months crt.sh
pqwnvguds.mrbasic.com
R3
2023-03-18 -
2023-06-16
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2023-03-02 -
2023-05-25
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2023-03-02 -
2023-05-25
3 months crt.sh

This page contains 1 frames:

Primary Page: https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
Frame ID: BAC78DAFB452301FE147D103A5F6AD98
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://degp.cc/G3G5 HTTP 302
    https://rough-dust-4008.7e-sk9r8.workers.dev/ Page URL
  2. https://pasnftsa.qpoe.com/ Page URL
  3. https://pasnftsa.qpoe.com/index.php?t=3386f5be38ae3a8a340dbf0001a0e0c6b29b45ad524b1d85967e6d09c90308df HTTP 302
    https://pasnftsa.qpoe.com/tiaozhuan.php HTTP 302
    https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fau... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns

Page Statistics

6
Requests

100 %
HTTPS

0 %
IPv6

5
Domains

5
Subdomains

4
IPs

3
Countries

51 kB
Transfer

56 kB
Size

4
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://degp.cc/G3G5 HTTP 302
    https://rough-dust-4008.7e-sk9r8.workers.dev/ Page URL
  2. https://pasnftsa.qpoe.com/ Page URL
  3. https://pasnftsa.qpoe.com/index.php?t=3386f5be38ae3a8a340dbf0001a0e0c6b29b45ad524b1d85967e6d09c90308df HTTP 302
    https://pasnftsa.qpoe.com/tiaozhuan.php HTTP 302
    https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://degp.cc/G3G5 HTTP 302
  • https://rough-dust-4008.7e-sk9r8.workers.dev/

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
rough-dust-4008.7e-sk9r8.workers.dev/
Redirect Chain
  • http://degp.cc/G3G5
  • https://rough-dust-4008.7e-sk9r8.workers.dev/
65 B
523 B
Document
General
Full URL
https://rough-dust-4008.7e-sk9r8.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.67.212.134 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-ray
7a9cfd739fa42053-NRT
content-encoding
br
content-type
text/html;charset=UTF-8
date
Sat, 18 Mar 2023 11:03:36 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=a2krG4brLMnMSlzNcAwtZ3DF8C%2F5VU%2FWfmUlthTRXkOuMJtSidUmD%2BfQvnnMKz5RwxvH%2B68IIJ9FkV7dKyHQW5lJ1RqJLPQiQ%2FzVV5C5g3vey1JjFJXuakbmmnWnUfsyYi0AYzq6aG3xFowOk81AMnZ29NGg%2B7U%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding

Redirect headers

Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Date
Sat, 18 Mar 2023 11:03:35 GMT
Location
https://rough-dust-4008.7e-sk9r8.workers.dev/
Server
nginx
Transfer-Encoding
chunked
/
pasnftsa.qpoe.com/
1 KB
1012 B
Document
General
Full URL
https://pasnftsa.qpoe.com/
Requested by
Host: rough-dust-4008.7e-sk9r8.workers.dev
URL: https://rough-dust-4008.7e-sk9r8.workers.dev/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
45.156.27.249 , Russian Federation, ASN56971 (CLOUDBACKBONE, HK),
Reverse DNS
Software
Apache /
Resource Hash
3a39ad23dd4c2fbece81e9c040c3bee2b67b58ba80ea12a55b9b8082b5dd2eb1

Request headers

Referer
https://rough-dust-4008.7e-sk9r8.workers.dev/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-length
598
content-type
text/html; charset=UTF-8
date
Sat, 18 Mar 2023 11:03:37 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
server
Apache
vary
Accept-Encoding
vendor.23238u92u82.js
pasnftsa.qpoe.com/vendor/
5 KB
2 KB
Script
General
Full URL
https://pasnftsa.qpoe.com/vendor/vendor.23238u92u82.js
Requested by
Host: pasnftsa.qpoe.com
URL: https://pasnftsa.qpoe.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
45.156.27.249 , Russian Federation, ASN56971 (CLOUDBACKBONE, HK),
Reverse DNS
Software
Apache /
Resource Hash
ae9da3c9a568a7b3602dc54e10c324166db3abe1d3a6892770d6ce6a7cc8c1c6

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://pasnftsa.qpoe.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36

Response headers

date
Sat, 18 Mar 2023 11:03:38 GMT
content-encoding
gzip
last-modified
Wed, 07 Apr 2021 02:24:54 GMT
server
Apache
etag
"1375-5bf58a2dd6980-gzip"
vary
Accept-Encoding
content-type
application/javascript
accept-ranges
bytes
content-length
1907
Primary Request index.php
pasnftsa.qpoe.com/signin/
Redirect Chain
  • https://pasnftsa.qpoe.com/index.php?t=3386f5be38ae3a8a340dbf0001a0e0c6b29b45ad524b1d85967e6d09c90308df
  • https://pasnftsa.qpoe.com/tiaozhuan.php
  • https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_...
1 KB
716 B
Document
General
Full URL
https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
Requested by
Host: pasnftsa.qpoe.com
URL: https://pasnftsa.qpoe.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
45.156.27.249 , Russian Federation, ASN56971 (CLOUDBACKBONE, HK),
Reverse DNS
Software
Apache /
Resource Hash
566d7223aabeec93a8e74e1747563f5de6a7ee30292d00d3950c1f6c6f6770c1

Request headers

Referer
https://pasnftsa.qpoe.com/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-length
664
content-type
text/html; charset=utf-8
date
Sat, 18 Mar 2023 11:03:40 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
server
Apache
vary
Accept-Encoding

Redirect headers

cache-control
no-store, no-cache, must-revalidate
content-length
0
content-type
text/html; charset=UTF-8
date
Sat, 18 Mar 2023 11:03:40 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
./signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
pragma
no-cache
server
Apache
css
fonts.googleapis.com/
3 KB
954 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Raleway:100,600
Requested by
Host: pasnftsa.qpoe.com
URL: https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
216.58.220.106 -, , ASN (),
Reverse DNS
Software
ESF /
Resource Hash
47ef6165e62bc03a894a79542feda24ffc5ad71918085a69176273a299385078
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://pasnftsa.qpoe.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Sat, 18 Mar 2023 11:03:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Sat, 18 Mar 2023 10:58:45 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sat, 18 Mar 2023 11:03:43 GMT
1Ptug8zYS_SKggPNyC0ITw.woff2
fonts.gstatic.com/s/raleway/v28/
45 KB
46 KB
Font
General
Full URL
https://fonts.gstatic.com/s/raleway/v28/1Ptug8zYS_SKggPNyC0ITw.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Raleway:100,600
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
172.217.175.227 -, , ASN (),
Reverse DNS
Software
sffe /
Resource Hash
405ceee1c2f5c31f1cb94ebc63d49a43fddd1471c2c7401a01c7c11bb1d93826
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://pasnftsa.qpoe.com
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.64 Safari/537.36

Response headers

date
Fri, 17 Mar 2023 07:48:17 GMT
x-content-type-options
nosniff
age
98126
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
46524
x-xss-protection
0
last-modified
Mon, 18 Jul 2022 19:58:01 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Sat, 16 Mar 2024 07:48:17 GMT

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless

4 Cookies

Domain/Path Name / Value
pasnftsa.qpoe.com/ Name: PHPSESSID
Value: 6sj4mc2mlgt94es3g2602utfve
.pasnftsa.qpoe.com/ Name: 62345ba76168db0033ce8ae6a90ce5a762956614
Value: nwcMGFHjQc7nDOZDxhWlbg%3D%3D
.pasnftsa.qpoe.com/ Name: _amkc
Value: a7a989f3-a7f9-450d-bd22-b54557393ef2
.pasnftsa.qpoe.com/ Name: ak_bmsc
Value: HMJyY4QpYViN2wNej1f0QAfOtvh743y02TUAtJons5VGWllg5WEh1HAMYliDv95cIONWeGfKhAnHWEim4V9HNFqE1rTfYU%2F8iE25bXIXOlcd8jMf4dfQ3JiRQ4hpB5LL8DHRnVoMpwEuSIdFZlK8%2FnI1qKk5gWLryxUwU%2BGMiBHVKCdc%2FvnZiSJ0zz40O40Mv5lTchsUjKbJHoaw1X8Usx0TrOxnA1C7XMqum%2F0BqZovFjanHkYMeGuK0gxFV77r9Qjah2SGP3FPvxG7ez5ohZPwht%2FAmHjOB2eJa4vwNoT03qUmjvU2%2BIqc7zv4MevIFg5QbInfrVc0v9uKoK502F7%2FgcjEJ6w%2BSsyC0vytIO1kbCSj%2F55yQ5587yzuAErWhmdrg47A1Jw1RerTrO4xVvO7SJKC4bIdRCd1X%2F%2BpF%2BHqSE44qFRb6iqggVPMiYQ7P2WrHdmkebcmRBDIMjjcTbvnfXgumfgm6JGGj9l8QG%2FhQ0Xz0xkVrHAwJQH5aM2wr6pd93HZHDkA%2Fx6yCpjFo1CzL82jwiNoSxjH%2FSC38j4IDnPvDSlw%2BkAkX1DcuGxWuBAu7Gj%2FeI4fOkiOaQZ2h%2Bxb%2BBhfnAY3px71ytzs5U0AJ%2B2hVWYhxE1RliSJ5xO%2FthklRhNMDTRYazG8YmFD9ly%2FzcQqONxQZf%2BMNWTehgPEAlBaZwYQ18eshKvpSPIpx8Kc68p2R0Pvug3lFZVTDGzC55A17dzGm0xVKpa9HQI%3D

1 Console Messages

Source Level URL
Text
network error URL: https://pasnftsa.qpoe.com/signin/index.php?openid_pape_max_auth_age=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier&openid_return_to=https%3A%2F%2Fwww.amazon.co.jp%2F%3Fref_%3Dnav_em_hd_re_signin&openid.identity=_select&openid.assoc_handle=jpflex&openid.mode=checkid_setup&key=a@b.c&openid.claimed_id=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0%2Fidentifier_select&openid.ns=http%3A%2F%2Fspecs.openid.net%2Fauth%2F2.0&&ref_=nav_em_hd_clc_signin
Message:
Failed to load resource: the server responded with a status of 404 ()