www.amaizon-fashion.com
Open in
urlscan Pro
154.209.4.28
Malicious Activity!
Public Scan
Effective URL: http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/login.php?p=0&token=7777772e616d61697a6f6e2d66617368696f6e2e636f6d
Submission: On March 05 via manual from JP
Summary
This is the only time www.amaizon-fashion.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 17 | 154.209.4.28 154.209.4.28 | 133115 (HKKF-AS-A...) (HKKF-AS-AP hongkong kwaifong information service limited) | |
15 | 1 |
ASN133115 (HKKF-AS-AP hongkong kwaifong information service limited, HK)
www.amaizon-fashion.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
amaizon-fashion.com
2 redirects
www.amaizon-fashion.com |
538 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
17 | www.amaizon-fashion.com |
2 redirects
www.amaizon-fashion.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/login.php?p=0&token=7777772e616d61697a6f6e2d66617368696f6e2e636f6d
Frame ID: B733611BC22FAA3ECB09B41F63CEA6D2
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O
HTTP 301
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ HTTP 302
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/login.php?p=0&token=7777772e616d61697a6f6e2... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Perl (Programming Languages) Expand
Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_perl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_perl(?:\/([\d\.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O
HTTP 301
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ HTTP 302
http://www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/login.php?p=0&token=7777772e616d61697a6f6e2d66617368696f6e2e636f6d Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
www.amaizon-fashion.com/ |
0 507 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ Redirect Chain
|
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
141 KB 142 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tnof.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/assets/img/ |
202 KB 202 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wheYE.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ |
145 B 485 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sdcOp.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ |
462 B 803 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
JIgYC.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ |
116 B 456 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SxzEs.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ |
346 B 687 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LOEPX.css
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/ |
203 B 542 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_002.js
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
48 KB 48 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_003.js
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
19 KB 19 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
95 KB 95 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Verdana.ttf
www.amaizon-fashion.com/1dm6NokhptKGZQYjXAyiVxrF7DvIUu3O/mix/ |
11 KB 11 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon Japan (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| bootstrap function| Popper function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.amaizon-fashion.com
154.209.4.28
04e11ddb49d68add5be12de9bec9dafc2a41c43aa0052401be2f8cc3465ab8ed
27ba9c87848761ed70860bb45564dcff71bfeeadc409ee54834a99ab37ef0886
5292ea102af77c3a1fa958285190dd4e23e7ece87cb8e3b92b82af3a0ffed491
577293f50f799a58c0a60a08805ba59950749c46b338dd6cbdb6abcd563bd53e
5d293ecdf4caefa49b3806f60b23a519ebd6385534101ce0f1a4ad7b4d2ade82
8b0107d2d86b4230245431d8cd35750d1196ad19f33554a765ac491114299b41
8c639674ca13605f4dee8572504ddb5236c8ff4404ad3870ffbd10cbfc178231
939b8121c10b3067d8534e01784d291ede908312f51cd0b6bfae1b5f0e5d12d1
946b2e85f6abd8cdf635444263bbe0135df0fa124f5e86deafc85c1598fee828
994079c64c942c14737b905638bd57ccb731bb1dacce88378eeff4da1002c1a6
9969e5f5d1e4f41a2aea057826e3a3ef3b01dc25e8ef87c4c8380e5977b1a39d
a23ce736c61b0b15f5a593420e25340e5ccccf1411b9b41b7eebe9850c9265c0
c4b6ed2645519ec2c128badb2a2e7720052f8441ffa94c4f0bceca02311004da
d1550d30e03f777fb25a2761e42fd8640fc2891fe3f8319524e5a0f17ede803d