amamzzlon.vip
Open in
urlscan Pro
107.175.245.143
Malicious Activity!
Public Scan
Submission: On March 09 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on March 7th 2022. Valid for: 3 months.
This is the only time amamzzlon.vip was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online) Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
22 | 107.175.245.143 107.175.245.143 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
22 | 1 |
ASN36352 (AS-COLOCROSSING, US)
PTR: 107-175-245-143-host.colocrossing.com
amamzzlon.vip |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
amamzzlon.vip
amamzzlon.vip |
289 KB |
22 | 1 |
Domain | Requested by | |
---|---|---|
22 | amamzzlon.vip |
amamzzlon.vip
|
22 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
amamzzlon.vip R3 |
2022-03-07 - 2022-06-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://amamzzlon.vip/
Frame ID: B99A6EF23C69098C53A51EA19407CD44
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
AmazonサインインDetected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
amamzzlon.vip/ |
1 KB 642 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylesheet1.css
amamzzlon.vip/css/ |
158 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylesheet2.css
amamzzlon.vip/css/ |
59 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylesheet3.css
amamzzlon.vip/css/ |
55 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loader.css
amamzzlon.vip/css/ |
2 KB 563 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylesheet4.css
amamzzlon.vip/css/ |
321 KB 42 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylesheet7.css
amamzzlon.vip/css/ |
2 KB 863 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.11.1.min.js
amamzzlon.vip/js/ |
94 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
luhmCheck.js
amamzzlon.vip/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.1d52a3bf.css
amamzzlon.vip/css/ |
637 B 399 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
runtime.706dc4e7.js
amamzzlon.vip/js/ |
1 KB 788 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.49bf4ec6.js
amamzzlon.vip/js/ |
140 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.2f5f2120.js
amamzzlon.vip/js/ |
157 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.45b4330.gif
amamzzlon.vip/appimg/ |
65 KB 65 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
jump.php
amamzzlon.vip/api/ |
6 B 249 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amber_rg.woff2
amamzzlon.vip/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amber_rg.woff
amamzzlon.vip/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api_session.php
amamzzlon.vip/api/ |
85 B 162 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_nav_1t.png
amamzzlon.vip/appimg/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_nav_jp_t1.png
amamzzlon.vip/appimg/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
amber_bd.woff2
amamzzlon.vip/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
aember_bd.woff
amamzzlon.vip/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online) Amazon Japan (Online)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| $ function| jQuery function| luhmCheck object| webpackJsonp object| __core-js_shared__ object| core function| shows function| showsb string| type1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amamzzlon.vip/ | Name: PHPSESSID Value: g2o1m4nt1dqo2f89p30der9ti6 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amamzzlon.vip
107.175.245.143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