redzonetienda.com
Open in
urlscan Pro
2606:4700:3033::ac43:8c02
Malicious Activity!
Public Scan
Effective URL: https://redzonetienda.com/?err=UNOWP3FGB7ZGN7AYZNH&dispatch=b2c&id=3585b750b8c67914765c09a9774C3b
Submission: On October 03 via manual from TW — Scanned from US
Summary
TLS certificate: Issued by WE1 on September 20th 2024. Valid for: 3 months.
This is the only time redzonetienda.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2606:4700:303... 2606:4700:3033::ac43:8c02 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
redzonetienda.com
redzonetienda.com |
163 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | redzonetienda.com |
redzonetienda.com
|
12 | 1 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
redzonetienda.com WE1 |
2024-09-20 - 2024-12-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://redzonetienda.com/?err=UNOWP3FGB7ZGN7AYZNH&dispatch=b2c&id=3585b750b8c67914765c09a9774C3b
Frame ID: C04E50D4ABF85DBBC2912FFF5C295083
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
JINKOSOLAR - MailDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
redzonetienda.com/ |
137 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
speculation
redzonetienda.com/cdn-cgi/ |
128 B 565 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
redzonetienda.com/JINKOSOLAR%20-%20Mail_files/ |
157 KB 36 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
all.min.css
redzonetienda.com/JINKOSOLAR%20-%20Mail_files/ |
58 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
css2
redzonetienda.com/JINKOSOLAR%20-%20Mail_files/ |
13 KB 13 KB |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
axios.min.js.download
redzonetienda.com/JINKOSOLAR%20-%20Mail_files/ |
14 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js.download
redzonetienda.com/JINKOSOLAR%20-%20Mail_files/ |
87 KB 39 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.bundle.min.js.download
redzonetienda.com/JINKOSOLAR%20-%20Mail_files/ |
82 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
wallpaper.png
redzonetienda.com/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-solid-900.woff2
redzonetienda.com/webfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-solid-900.woff
redzonetienda.com/webfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-solid-900.ttf
redzonetienda.com/webfonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| axios function| $ function| jQuery object| bootstrap function| sendMail function| validateEmail function| urlExists function| setNameAndFavicon function| randomString string| rString string| MAIL_URL string| AUTH_LOADING_MESSAGE string| FINAL_REDIRECT_URL number| retryAttemptCount0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
redzonetienda.com
2606:4700:3033::ac43:8c02
11a2142988720cd49ff000e5d488493947b3d34821301c5a706b3495b8381f7d
24b9a49d375465e659dbaecb3fda81fbf0d3eedbf138e29cb5229e502d8a4fa1
4d75506f7b579bb5e5a101192e0e53759e5373a6fa007a80beaf903703259ea8
8d7089253dca29c9cd8d9deb7ec69b0a3d445f88f6a26478c719be1f90adcb01
95b93d7af3cbaefa7916ca165fe88380611b31732e487a57e5261025338eb53a
bafbb9f5c0cc9c29523fd880b7dc05220597400e5fee27cbcefd13ddbc790e83
d87ddf917b7a1449ab45e2b8e3c98354629bdd65b6659c37e6023bbea1ce1386
f77c0d1739b618edc4a01ca3f6b2990b01a3009030af49ee8cf68e83052df194
f8364a8976086cbd233ce2efa50c818331d49f1577729a562be2a57c8bfdfec3
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e