https-majestic-fortress-com.vercel.app Open in urlscan Pro
76.76.21.93  Malicious Activity! Public Scan

URL: https://https-majestic-fortress-com.vercel.app/benzap
Submission: On September 24 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 76.76.21.93, located in Walnut, United States and belongs to AMAZON-02, US. The main domain is https-majestic-fortress-com.vercel.app.
TLS certificate: Issued by R11 on August 14th 2024. Valid for: 3 months.
This is the only time https-majestic-fortress-com.vercel.app was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Email (Online)

Domain & IP information

IP Address AS Autonomous System
1 76.76.21.93 16509 (AMAZON-02)
2 44.239.194.147 16509 (AMAZON-02)
3 3
Apex Domain
Subdomains
Transfer
2 kickfire.com
api.kickfire.com — Cisco Umbrella Rank: 138416
227 B
1 vercel.app
https-majestic-fortress-com.vercel.app
14 KB
3 2
Domain Requested by
2 api.kickfire.com https-majestic-fortress-com.vercel.app
1 https-majestic-fortress-com.vercel.app
3 2

This site contains no links.

Subject Issuer Validity Valid
*.vercel.app
R11
2024-08-14 -
2024-11-12
3 months crt.sh
api.kickfire.com
Amazon RSA 2048 M02
2024-03-01 -
2025-03-30
a year crt.sh

This page contains 1 frames:

Primary Page: https://https-majestic-fortress-com.vercel.app/benzap
Frame ID: D76DEE3DB9B20109F1D93D9AB8639E27
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Webmail Portal Login

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

1
Countries

15 kB
Transfer

33 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request benzap
https-majestic-fortress-com.vercel.app/
20 KB
14 KB
Document
General
Full URL
https://https-majestic-fortress-com.vercel.app/benzap
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
76.76.21.93 Walnut, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Vercel /
Resource Hash
953592b9b7791c71b68817ce6bcce62c8e5b4fbf21cd3374aec69cd54a2edcaf
Security Headers
Name Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Response headers

age
0
cache-control
public, max-age=0, must-revalidate
content-encoding
br
content-type
text/html; charset=utf-8
date
Tue, 24 Sep 2024 23:58:26 GMT
server
Vercel
strict-transport-security
max-age=63072000; includeSubDomains; preload
x-vercel-cache
MISS
x-vercel-id
fra1::iad1::t2z2c-1727222306800-72e8b85fa2ca
logo
api.kickfire.com/
0
114 B
Image
General
Full URL
https://api.kickfire.com/logo?website=None
Requested by
Host: https-majestic-fortress-com.vercel.app
URL: https://https-majestic-fortress-com.vercel.app/benzap
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.239.194.147 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-239-194-147.us-west-2.compute.amazonaws.com
Software
Apache / PHP/7.2.34
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://https-majestic-fortress-com.vercel.app/

Response headers

access-control-allow-origin
*
content-length
0
date
Tue, 24 Sep 2024 23:58:27 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.2.34
server
Apache
truncated
/
11 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ca9c16ff6fd2a19da375cb0abbbc8ecbed1e5075efc25bb9da1828a7050dc579

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
558 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
578254b8c8e53db6ffe80754d29a9db454d8818885ac826b11e9b95389618b5b

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
520 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2172033cc841f94e32ca4412cd380e43d873a9e74e54aee03f0d26ed72d20be5

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
logo
api.kickfire.com/
0
113 B
Other
General
Full URL
https://api.kickfire.com/logo?website=None
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.239.194.147 Boardman, United States, ASN16509 (AMAZON-02, US),
Reverse DNS
ec2-44-239-194-147.us-west-2.compute.amazonaws.com
Software
Apache / PHP/7.2.34
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://https-majestic-fortress-com.vercel.app/

Response headers

access-control-allow-origin
*
content-length
0
date
Tue, 24 Sep 2024 23:58:27 GMT
content-type
text/html; charset=UTF-8
x-powered-by
PHP/7.2.34
server
Apache

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Email (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0

0 Cookies

3 Console Messages

Source Level URL
Text
recommendation verbose URL: https://https-majestic-fortress-com.vercel.app/benzap
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
network error URL: https://api.kickfire.com/logo?website=None
Message:
Failed to load resource: the server responded with a status of 404 ()
network error URL: https://api.kickfire.com/logo?website=None
Message:
Failed to load resource: the server responded with a status of 404 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=63072000; includeSubDomains; preload