dkswz.com.ru
Open in
urlscan Pro
91.234.99.83
Malicious Activity!
Public Scan
Effective URL: http://dkswz.com.ru/pp/germanyamazon/mobile/login/
Submission: On March 29 via automatic, source openphish
Summary
This is the only time dkswz.com.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 12 | 91.234.99.83 91.234.99.83 | 48666 (AS-MAROSN...) (AS-MAROSNET Moscow) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
com.ru
2 redirects
dkswz.com.ru |
389 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
12 | dkswz.com.ru |
2 redirects
dkswz.com.ru
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://dkswz.com.ru/pp/germanyamazon/mobile/login/
Frame ID: 57A6F20EF0AF24BCF76DDEBED51982F5
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://dkswz.com.ru/pp/germanyamazon/mobile
HTTP 301
http://dkswz.com.ru/pp/germanyamazon/mobile/ HTTP 302
http://dkswz.com.ru/pp/germanyamazon/mobile/login/ Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- script /angular.*\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://dkswz.com.ru/pp/germanyamazon/mobile
HTTP 301
http://dkswz.com.ru/pp/germanyamazon/mobile/ HTTP 302
http://dkswz.com.ru/pp/germanyamazon/mobile/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
dkswz.com.ru/pp/germanyamazon/mobile/login/ Redirect Chain
|
23 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
dkswz.com.ru/pp/germanyamazon/bower_components/jquery/dist/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
dkswz.com.ru/pp/germanyamazon/bower_components/ua-parser-js/dist/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
dkswz.com.ru/pp/germanyamazon/bower_components/font-awesome/css/ |
30 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
dkswz.com.ru/pp/germanyamazon/bower_components/angular/ |
165 KB 165 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
dkswz.com.ru/pp/germanyamazon/mobile/login/form/ |
60 B 300 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
dkswz.com.ru/pp/germanyamazon/mobile/login/ |
26 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
dkswz.com.ru/pp/germanyamazon/mobile/login/form/ |
10 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng.js
dkswz.com.ru/pp/germanyamazon/mobile/login/ng/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amazonuibasecss-sprite_1x-28bd59af93d9b1c745bb0aca4de58763b54df7cf._v2_.png
dkswz.com.ru/pp/germanyamazon/mobile/login/ |
26 KB 26 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)26 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| UAParser object| angular string| bid object| php_js string| el function| next__ function| finish__ object| cookies function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q object| loader_ function| send1 object| app object| VTO object| VTOM object| sc_1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dkswz.com.ru/pp/germanyamazon/mobile | Name: bid Value: germanyamazon |
16 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dkswz.com.ru
91.234.99.83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