buralarda-enguzel-mutlu-eden-yenilik-budur.com
Open in
urlscan Pro
154.216.20.169
Malicious Activity!
Public Scan
Submission: On October 24 via api from CA — Scanned from CA
Summary
TLS certificate: Issued by R10 on October 23rd 2024. Valid for: 3 months.
This is the only time buralarda-enguzel-mutlu-eden-yenilik-budur.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: A101 (Retail)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 154.216.20.169 154.216.20.169 | 215240 (NETRESEARCH) (NETRESEARCH) | |
3 | 2600:9000:266... 2600:9000:266a:a400:3:ee41:2800:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 2 |
ASN215240 (NETRESEARCH, GB)
buralarda-enguzel-mutlu-eden-yenilik-budur.com |
ASN16509 (AMAZON-02, US)
api.a101prod.retter.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
buralarda-enguzel-mutlu-eden-yenilik-budur.com
buralarda-enguzel-mutlu-eden-yenilik-budur.com |
23 KB |
3 |
retter.io
api.a101prod.retter.io |
9 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
4 | buralarda-enguzel-mutlu-eden-yenilik-budur.com |
buralarda-enguzel-mutlu-eden-yenilik-budur.com
|
3 | api.a101prod.retter.io | |
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
buralarda-enguzel-mutlu-eden-yenilik-budur.com R10 |
2024-10-23 - 2025-01-21 |
3 months | crt.sh |
*.a101kapida.com Amazon RSA 2048 M03 |
2024-07-21 - 2025-08-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://buralarda-enguzel-mutlu-eden-yenilik-budur.com/sadece-online-ozel/
Frame ID: D94B8D13337B84B364BC8CF121ED6531
Requests: 7 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
buralarda-enguzel-mutlu-eden-yenilik-budur.com/sadece-online-ozel/ |
9 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ff8d6c6ab4a073db.css
buralarda-enguzel-mutlu-eden-yenilik-budur.com/sadece-online-ozel/_next/static/css/ |
100 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
454bf7671580d9b7.css
buralarda-enguzel-mutlu-eden-yenilik-budur.com/sadece-online-ozel/_next/static/css/ |
10 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
a101-logo-2_256x256.svg
api.a101prod.retter.io/dbmk89vnr/CALL/Image/get/ |
975 B 1 KB |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
extra-logo_512x512.svg
api.a101prod.retter.io/dbmk89vnr/CALL/Image/get/ |
4 KB 4 KB |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kapida-logo_512x512.svg
api.a101prod.retter.io/dbmk89vnr/CALL/Image/get/ |
3 KB 4 KB |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
buralarda-enguzel-mutlu-eden-yenilik-budur.com/ |
808 B 501 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: A101 (Retail)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.a101prod.retter.io
buralarda-enguzel-mutlu-eden-yenilik-budur.com
154.216.20.169
2600:9000:266a:a400:3:ee41:2800:93a1
20ad04b8fb2bb408c467892070b47b78e6d083a9f65f013a6b1ba654bcd014cc
378c5aa4124044be6733be0135066a2b1a9eee6ea07d21dd9f1ec5053a4a6a45
53ebcb69ae49fcca80a92e436ff82c3421c4cdf00f9b8fef1c71a6891eed7cdd
703af3c19cdd8655fd378e6baad98a689b5795606dfb3b58593d9f1c60128684
7042a293e2a468c17198c4b9a4047e38d5780c4bddb87bb8b4c07d70bb4782b4
ac5fc0a0d5c895d15bd4be1269aaee5adb8e5ff2aa9a60da8b00a53372208aa9
b9347f234dc3c8d56e015e86d88a1400415db8f7a5ad91f02b6a2323c10a4187