www.kanghutrob.com
Open in
urlscan Pro
93.90.145.103
Malicious Activity!
Public Scan
Effective URL: http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/index.php?cmd=5885d80a13c0db1f22d2300ef60a6759...
Submission: On September 09 via automatic, source openphish
Summary
This is the only time www.kanghutrob.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 91.212.205.220 91.212.205.220 | 49328 (PRIVIANET-AS) (PRIVIANET-AS) | |
3 9 | 93.90.145.103 93.90.145.103 | 35041 (NET-CRYST...) (NET-CRYSTONE-STHLM) | |
6 | 1 |
ASN35041 (NET-CRYSTONE-STHLM, SE)
PTR: apache-03.crystone.se
www.kanghutrob.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
kanghutrob.com
3 redirects
www.kanghutrob.com |
134 KB |
1 |
vouauriezla.com
1 redirects
vouauriezla.com |
223 B |
6 | 2 |
Domain | Requested by | |
---|---|---|
9 | www.kanghutrob.com |
3 redirects
www.kanghutrob.com
|
1 | vouauriezla.com | 1 redirects |
6 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/index.php?cmd=5885d80a13c0db1f22d2300ef60a67593b79a4d03747447e6b625328d36121a1f72ea3d9313e91c9d8dec438c4f1d078f72ea3d9313e91c9d8dec438c4f1d078
Frame ID: 22009.1
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://vouauriezla.com/contact/
HTTP 302
http://www.kanghutrob.com/amzaon/ HTTP 302
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e HTTP 301
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/ HTTP 302
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/index.php Page URL
- http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/index.php?cmd=5885d80a13c0... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://vouauriezla.com/contact/
HTTP 302
http://www.kanghutrob.com/amzaon/ HTTP 302
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e HTTP 301
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/ HTTP 302
http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/index.php Page URL
- http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/index.php?cmd=5885d80a13c0db1f22d2300ef60a67593b79a4d03747447e6b625328d36121a1f72ea3d9313e91c9d8dec438c4f1d078f72ea3d9313e91c9d8dec438c4f1d078 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://vouauriezla.com/contact/ HTTP 302
- http://www.kanghutrob.com/amzaon/ HTTP 302
- http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e HTTP 301
- http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/ HTTP 302
- http://www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/index.php
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
index.php
www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/ Redirect Chain
|
470 B 482 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
index.php
www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/ |
27 KB 27 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ap-flex-reduced-nav._3C8_.css
www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/content/ |
17 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ap-flex-reduced-nav-2.0._V393733149_.js
www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/content/ |
84 KB 84 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sign-in-secure._V192194766_.gif
www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/content/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
amazon_logo_no-org_mid._V153387053_.png
www.kanghutrob.com/amzaon/2a0be681e531843081a64c500dc9ea6e/index/web/content/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
vouauriezla.com
www.kanghutrob.com
91.212.205.220
93.90.145.103
5afdf0029fa176fe1121265a778bb6ec0d95c675e6638b3503d3bb5d91ad435a
605f462159b4e3b5352c949d60bf5c3bc109f79d3507f07e9e9b9275c53e2532
765dd2ecce31f4944b9a329ac0bb16014e0d006a1aa3e4bb7e8d1d2ac4eb1b80
ce5c3e1e373400970ee5a938f6d9771cb4b82d0fa517185b8acdaa91759f82d8
e246ed882916adae0ea33c35450eabd99da8b22937ec83381cc22675d2761cde
e33ac4019b289b4d96cae7be435a0559517521c803895907915d60dcce1005e5