www.kuzka.gov.tr
Open in
urlscan Pro
213.238.176.194
Malicious Activity!
Public Scan
Submission: On January 26 via api from US — Scanned from US
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 17th 2024. Valid for: a year.
This is the only time www.kuzka.gov.tr was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: American Express (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 213.238.176.194 213.238.176.194 | 41683 (EARTH) (EARTH) | |
3 | 2606:4700::68... 2606:4700::6813:a741 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 139.71.113.91 139.71.113.91 | 6307 (AMERICAN-...) (AMERICAN-EXPRESS) | |
3 | 23.192.23.103 23.192.23.103 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 5 |
ASN6307 (AMERICAN-EXPRESS, US)
PTR: cdaas11.americanexpress.com
cdaas.americanexpress.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-192-23-103.deploy.static.akamaitechnologies.com
www.aexp-static.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
aexp-static.com
www.aexp-static.com — Cisco Umbrella Rank: 13520 |
108 KB |
3 |
cloudinary.com
res.cloudinary.com — Cisco Umbrella Rank: 2467 |
140 KB |
1 |
americanexpress.com
cdaas.americanexpress.com — Cisco Umbrella Rank: 36060 |
11 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 225 |
27 KB |
1 |
kuzka.gov.tr
www.kuzka.gov.tr |
3 KB |
9 | 5 |
Domain | Requested by | |
---|---|---|
3 | www.aexp-static.com |
res.cloudinary.com
|
3 | res.cloudinary.com |
www.kuzka.gov.tr
|
1 | cdaas.americanexpress.com |
res.cloudinary.com
|
1 | cdnjs.cloudflare.com |
www.kuzka.gov.tr
|
1 | www.kuzka.gov.tr | |
9 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.kuzka.gov.tr Sectigo RSA Domain Validation Secure Server CA |
2024-01-17 - 2025-01-16 |
a year | crt.sh |
*.cloudinary.com Go Daddy Secure Certificate Authority - G2 |
2023-12-14 - 2024-06-22 |
6 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
cdaas.americanexpress.com DigiCert SHA2 Extended Validation Server CA |
2023-10-11 - 2024-10-09 |
a year | crt.sh |
m.americanexpress.com DigiCert EV RSA CA G2 |
2023-04-05 - 2024-04-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.kuzka.gov.tr/Page/ae/enUS/?mid=2527649&state=eyJNieeOzyfogL26bYF87FWFsj2IvM9yvIbdh83jS36jMZ6G77Bx6aenVlVmykh0c218GBLFppu1ge024Wr4R6shrSFLZqLV87aTZ05AeYEis06W440z61Ves09EFvsV5JXtvua9wE0Gr6IfG3kwu3s8kc8820IL122a8PsWfq3RTL3epf5ghsW0Y5diWeJW2w3FdNPdGXdfj392nWRk1tV022zX8KrvOiLrv093P9qTTVm6bKncO5nr7YMFiAfvHKi2Jc0268dhtAZP0pb6WZC21w47Kk1hgYVbHJWp3iq8WzGw
Frame ID: D47EBF0A9C8DD030023252F9F0B473ED
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
American Express |Detected technologies
Amex Express Checkout (Payment processors) ExpandDetected patterns
- aexp-static\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.kuzka.gov.tr/Page/ae/enUS/ |
7 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-min.css
res.cloudinary.com/bwxfzlb9iu0ml9/raw/upload/v1699455710/contents/ |
299 KB 49 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-fonts.css
res.cloudinary.com/bwxfzlb9iu0ml9/raw/upload/v1699455736/contents/ |
212 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oce-font.css
res.cloudinary.com/bwxfzlb9iu0ml9/raw/upload/v1699455755/contents/ |
104 KB 69 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.7.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amex-desktop-logo.png
cdaas.americanexpress.com/myca/oce/latest/content/images/common/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0fababca-4914-46dd-9b0f-efbd51f67ae8-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
37 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3be50273-0b2e-4aef-ae68-882eacd611f9-3.woff
www.aexp-static.com/nav/ngn/fonts/ |
36 KB 37 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dls-icons.woff
www.aexp-static.com/cdaas/one/statics/axp-dls/5.10.1/package/dist/iconfont/ |
34 KB 34 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: American Express (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15768000; includeSubDomains |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdaas.americanexpress.com
cdnjs.cloudflare.com
res.cloudinary.com
www.aexp-static.com
www.kuzka.gov.tr
139.71.113.91
213.238.176.194
23.192.23.103
2606:4700::6811:180e
2606:4700::6813:a741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