amaouzn.kjfdief8aad.top
Open in
urlscan Pro
204.44.92.140
Malicious Activity!
Public Scan
Submission: On February 26 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 25th 2022. Valid for: 3 months.
This is the only time amaouzn.kjfdief8aad.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online) Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 204.44.92.140 204.44.92.140 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 2600:9000:20c... 2600:9000:20c4:4800:10:1731:ff49:ac01 | 16509 (AMAZON-02) (AMAZON-02) | |
13 | 2 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
PTR: 204.44.92.140.static.quadranet.com
amaouzn.kjfdief8aad.top |
ASN16509 (AMAZON-02, US)
images-cn.ssl-images-amazon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
kjfdief8aad.top
amaouzn.kjfdief8aad.top |
771 KB |
1 |
ssl-images-amazon.com
images-cn.ssl-images-amazon.com — Cisco Umbrella Rank: 306712 |
61 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
12 | amaouzn.kjfdief8aad.top |
amaouzn.kjfdief8aad.top
|
1 | images-cn.ssl-images-amazon.com |
amaouzn.kjfdief8aad.top
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
amaouzn.kjfdief8aad.top R3 |
2022-02-25 - 2022-05-26 |
3 months | crt.sh |
images-cn.ssl-images-amazon.com Amazon |
2021-12-15 - 2023-01-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://amaouzn.kjfdief8aad.top/
Frame ID: A138C7259631205A7BDBEC9BC3D68B8C
Requests: 13 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
amaouzn.kjfdief8aad.top/ |
546 B 457 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.752839d3f58c010ecc04f48dcc063497.css
amaouzn.kjfdief8aad.top/static/css/ |
4 MB 635 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
manifest.dd091f32d078ce1ae228.js
amaouzn.kjfdief8aad.top/static/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.8942a87b5a70d06cf6ea.js
amaouzn.kjfdief8aad.top/static/js/ |
233 KB 82 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.75f405b5d5d325e145c9.js
amaouzn.kjfdief8aad.top/static/js/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
8.67434be2e9f5b166bccc.js
amaouzn.kjfdief8aad.top/static/js/ |
861 B 619 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
amaouzn.kjfdief8aad.top/api/ |
6 B 250 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
14.e1d3405c170030bc6e16.js
amaouzn.kjfdief8aad.top/static/js/ |
675 B 501 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0.ae56cb9f68b80e8b1e62.js
amaouzn.kjfdief8aad.top/static/js/ |
97 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.4153f4cef02ec63128b4.js
amaouzn.kjfdief8aad.top/static/js/ |
13 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api_session.php
amaouzn.kjfdief8aad.top/api/ |
78 B 132 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
new-nav-sm-smile-sprite-global-1x_blueheaven._CB485919093_.99b76d8.png
amaouzn.kjfdief8aad.top/static/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
AmazonUIBaseCSS-sprite_2x-a3d92a134e6afaec4974bceac0812b73d0b635c1._V2_.png
images-cn.ssl-images-amazon.com/images/G/01/AUIClients/ |
60 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online) Amazon Japan (Online)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
amaouzn.kjfdief8aad.top/ | Name: PHPSESSID Value: gf63pj28jtu15t3fd5dcciv6t6 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
amaouzn.kjfdief8aad.top
images-cn.ssl-images-amazon.com
204.44.92.140
2600:9000:20c4:4800:10:1731:ff49:ac01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