amaozom.fnfsy.cn
Open in
urlscan Pro
204.44.70.227
Malicious Activity!
Public Scan
Effective URL: https://amaozom.fnfsy.cn/mobile/Amazonall_signin.php
Submission: On January 07 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on December 5th 2021. Valid for: 3 months.
This is the only time amaozom.fnfsy.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 204.44.70.227 204.44.70.227 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 2600:9000:213... 2600:9000:2138:5a00:10:1731:ff49:ac01 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2600:9000:215... 2600:9000:2157:fe00:1d:d7f6:39cf:a761 | 16509 (AMAZON-02) (AMAZON-02) | |
11 | 3 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
PTR: 204.44.70.227.static.quadranet.com
amaozom.fnfsy.cn |
ASN16509 (AMAZON-02, US)
images-cn.ssl-images-amazon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
fnfsy.cn
1 redirects
amaozom.fnfsy.cn |
68 KB |
1 |
media-amazon.com
m.media-amazon.com — Cisco Umbrella Rank: 570 |
13 KB |
1 |
ssl-images-amazon.com
images-cn.ssl-images-amazon.com — Cisco Umbrella Rank: 277029 |
61 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
10 | amaozom.fnfsy.cn |
1 redirects
amaozom.fnfsy.cn
|
1 | m.media-amazon.com |
amaozom.fnfsy.cn
|
1 | images-cn.ssl-images-amazon.com |
amaozom.fnfsy.cn
|
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ameozon.xw9vwkdd3.cn R3 |
2021-12-05 - 2022-03-05 |
3 months | crt.sh |
images-cn.ssl-images-amazon.com Amazon |
2021-12-15 - 2023-01-12 |
a year | crt.sh |
Images-na.ssl-images-amazon.com DigiCert Global CA G2 |
2021-03-23 - 2022-03-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://amaozom.fnfsy.cn/mobile/Amazonall_signin.php
Frame ID: 8D0FA15397314D39662938E43209B39C
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
AmazonログインPage URL History Show full URLs
-
https://amaozom.fnfsy.cn/
HTTP 302
https://amaozom.fnfsy.cn/mobile/Amazonall_signin.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://amaozom.fnfsy.cn/
HTTP 302
https://amaozom.fnfsy.cn/mobile/Amazonall_signin.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Amazonall_signin.php
amaozom.fnfsy.cn/mobile/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
61ccss.css
amaozom.fnfsy.cn/mobile/Amazonsignin_files/ |
136 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
01Scss.css
amaozom.fnfsy.cn/mobile/Amazonsignin_files/ |
51 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11Hcss.css
amaozom.fnfsy.cn/mobile/Amazonsignin_files/ |
2 KB 873 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
21Qcss.css
amaozom.fnfsy.cn/mobile/Amazonsignin_files/ |
79 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
219css.css
amaozom.fnfsy.cn/mobile/Amazonsignin_files/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new-nav-sm-smile-sprite-global-1x_blueheaven._CB485919093_.png
amaozom.fnfsy.cn/mobile/Amazonsignin_files/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo2.png
amaozom.fnfsy.cn/mobile/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new-nav-sm-smile-sprite-global-1x_blueheaven._CB485919093_.png
amaozom.fnfsy.cn/mobile/style/img/ |
263 B 263 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AmazonUIBaseCSS-sprite_2x-a3d92a134e6afaec4974bceac0812b73d0b635c1._V2_.png
images-cn.ssl-images-amazon.com/images/G/01/AUIClients/ |
60 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
InternationalCustomerPreferencesNavAssets-icp_sprite-0b528ccc99b2eed18447291de6df851bc2c6fe68._V2_.png
m.media-amazon.com/images/G/01/AUIClients/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon Japan (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onsecuritypolicyviolation object| onslotchange1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amaozom.fnfsy.cn/ | Name: PHPSESSID Value: lsutdur50mc9vpthg5ia8fhtm2 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amaozom.fnfsy.cn
images-cn.ssl-images-amazon.com
m.media-amazon.com
204.44.70.227
2600:9000:2138:5a00:10:1731:ff49:ac01
2600:9000:2157:fe00:1d:d7f6:39cf:a761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