groupon-deals.net
Open in
urlscan Pro
52.4.11.108
Malicious Activity!
Public Scan
Submission: On March 04 via automatic, source openphish
Summary
This is the only time groupon-deals.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Dropbox (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 52.4.11.108 52.4.11.108 | 14618 (AMAZON-AES) (AMAZON-AES) | |
4 | 52.216.88.251 52.216.88.251 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-4-11-108.compute-1.amazonaws.com
groupon-deals.net |
ASN16509 (AMAZON-02, US)
PTR: s3-1-w.amazonaws.com
securityiq.s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
amazonaws.com
securityiq.s3.amazonaws.com |
80 KB |
2 |
groupon-deals.net
groupon-deals.net |
4 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
4 | securityiq.s3.amazonaws.com |
groupon-deals.net
|
2 | groupon-deals.net |
groupon-deals.net
|
6 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.dropbox.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.amazonaws.com DigiCert Baltimore CA-2 G2 |
2019-11-09 - 2021-03-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://groupon-deals.net/landing/form/ef3ece06-5869-4e41-a69d-8c187b9214f9
Frame ID: 877C397530EAB6191635668229AB8930
Requests: 6 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Install
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
ef3ece06-5869-4e41-a69d-8c187b9214f9
groupon-deals.net/landing/form/ |
9 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
data-entry.a7c9d44faeaa1133.css
groupon-deals.net/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dropbox_logo_01.png
securityiq.s3.amazonaws.com/phishing-templates/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-boulder.png
securityiq.s3.amazonaws.com/phishing-templates/images/ |
67 KB 68 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google_btn.png
securityiq.s3.amazonaws.com/phishing-templates/images/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apple_btn.png
securityiq.s3.amazonaws.com/phishing-templates/images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Dropbox (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
groupon-deals.net
securityiq.s3.amazonaws.com
52.216.88.251
52.4.11.108
1996727b11e2d71d2b3a99332a2c446f131402a7c6cd372ef156dc84bde8d6f3
2a5f99f1656f11a4859c3c292155c4ee6784331dd0c75d3093df6359fbf3e95c
58c4fd84bd9e35f47581a261dcddcb9e83b38a35c10eb1c0aa31d121d212ce54
762098c8486b4fe9b4810943ea8bdd1222c921a08bf721a6c71d681ac1ee3d5e
e778d6902b44e9f9db92cb7d0c57082eb6215ed0b6da785c14f0fb9b2dfb8f94
f486dd244f3bae8a006758b411a1b19799d4b23aff2c360ec7b7b72c187deaa3