amazing-deals.xyz
Open in
urlscan Pro
172.67.168.90
Malicious Activity!
Public Scan
Effective URL: https://amazing-deals.xyz/za/ipn/?k=160680c059c443c214&uclick=uqbz4pvc&uclickhash=uqbz4pvc-uqbz4pvc-q5xr-0-pmgh-3z7s-3zfn-...
Submission: On April 04 via manual from HR — Scanned from GB
Summary
TLS certificate: Issued by GTS CA 1P5 on March 12th 2023. Valid for: 3 months.
This is the only time amazing-deals.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 45.77.119.224 45.77.119.224 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
1 1 | 18.200.180.197 18.200.180.197 | 16509 (AMAZON-02) (AMAZON-02) | |
11 | 172.67.168.90 172.67.168.90 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 1 |
ASN20473 (AS-CHOOPA, US)
PTR: 45.77.119.224.vultrusercontent.com
ponn.info |
ASN16509 (AMAZON-02, US)
PTR: ec2-18-200-180-197.eu-west-1.compute.amazonaws.com
diecting.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
amazing-deals.xyz
amazing-deals.xyz |
261 KB |
1 |
diecting.com
1 redirects
diecting.com |
458 B |
1 |
ponn.info
1 redirects
ponn.info |
163 B |
11 | 3 |
Domain | Requested by | |
---|---|---|
11 | amazing-deals.xyz |
amazing-deals.xyz
|
1 | diecting.com | 1 redirects |
1 | ponn.info | 1 redirects |
11 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
diecting.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.amazing-deals.xyz GTS CA 1P5 |
2023-03-12 - 2023-06-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://amazing-deals.xyz/za/ipn/?k=160680c059c443c214&uclick=uqbz4pvc&uclickhash=uqbz4pvc-uqbz4pvc-q5xr-0-pmgh-3z7s-3zfn-bd724c
Frame ID: B7B7F3D847F763D4E8B196CFE2B12D0B
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
iPhone 13 pro DeliveryPage URL History Show full URLs
-
http://ponn.info/ZGF4C9
HTTP 302
https://diecting.com/go.php?id=b8tcjmnau8kasrce58zp HTTP 302
https://amazing-deals.xyz/za/ipn/?k=160680c059c443c214&uclick=uqbz4pvc&uclickhash=uqbz4pvc-uqbz4pvc-q5... Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: CONFIRM DETAILS HERE
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ponn.info/ZGF4C9
HTTP 302
https://diecting.com/go.php?id=b8tcjmnau8kasrce58zp HTTP 302
https://amazing-deals.xyz/za/ipn/?k=160680c059c443c214&uclick=uqbz4pvc&uclickhash=uqbz4pvc-uqbz4pvc-q5xr-0-pmgh-3z7s-3zfn-bd724c Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
amazing-deals.xyz/za/ipn/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lander.min.css
amazing-deals.xyz/za/ipn/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png.html
amazing-deals.xyz/za/ipn/ |
372 B 372 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
product.png
amazing-deals.xyz/za/ipn/ |
80 KB 80 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amazon.png
amazing-deals.xyz/za/ipn/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
low.png
amazing-deals.xyz/za/ipn/ |
35 KB 35 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
amazing-deals.xyz/za/ipn/ |
27 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.1.4.min.js
amazing-deals.xyz/za/ipn/ |
82 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.min.js
amazing-deals.xyz/za/ipn/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
amazing-deals.xyz/za/ipn/ |
65 KB 65 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script.min.js
amazing-deals.xyz/za/m3_assets/3/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| downloadJSAtOnload function| $ function| jQuery function| startCheck function| changeBubble function| addNumber function| showMessage function| displayMessage function| showAllMessages string| data_1 string| data_2 string| data_3 object| firstQ number| t object| messages2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
diecting.com/ | Name: uclick Value: uqbz4pvc |
|
diecting.com/ | Name: uclickhash Value: uqbz4pvc-uqbz4pvc-q5xr-0-pmgh-3z7s-3zfn-bd724c |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amazing-deals.xyz
diecting.com
ponn.info
172.67.168.90
18.200.180.197
45.77.119.224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