wildnatureamazon.com
Open in
urlscan Pro
192.185.129.109
Malicious Activity!
Public Scan
Effective URL: https://wildnatureamazon.com/GP/domain/?jgoogle=ywnylm1lzglhqhrva3lvmjaymc5qca==&xma=c
Submission: On May 21 via manual from JP
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on April 9th 2020. Valid for: 3 months.
This is the only time wildnatureamazon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 198.12.123.178 198.12.123.178 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 10 | 192.185.129.109 192.185.129.109 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
11 | 3 |
ASN36352 (AS-COLOCROSSING, US)
PTR: wgh11.whogohost.com
zoominfoo.space |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: bh-ht-5.webhostbox.net
wildnatureamazon.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
wildnatureamazon.com
1 redirects
wildnatureamazon.com |
328 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
1 |
zoominfoo.space
zoominfoo.space |
4 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
10 | wildnatureamazon.com |
1 redirects
zoominfoo.space
wildnatureamazon.com |
1 | code.jquery.com |
zoominfoo.space
|
1 | zoominfoo.space | |
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
wildnatureamazon.com Let's Encrypt Authority X3 |
2020-04-09 - 2020-07-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://wildnatureamazon.com/GP/domain/?jgoogle=ywnylm1lzglhqhrva3lvmjaymc5qca==&xma=c
Frame ID: ED27BDBD49868B1DCC67F6421EE65BAF
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://zoominfoo.space/8161e9ab54cc3e36260f80593a4cc33?usy=ywnylm1lzglhqhrva3lvmjaymc5qca== Page URL
-
https://wildnatureamazon.com/GP/?ehdgk=ywnylm1lzglhqhrva3lvmjaymc5qca==&isfgsValidate=c
HTTP 302
https://wildnatureamazon.com/GP/domain/?jgoogle=ywnylm1lzglhqhrva3lvmjaymc5qca==&xma=c Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://zoominfoo.space/8161e9ab54cc3e36260f80593a4cc33?usy=ywnylm1lzglhqhrva3lvmjaymc5qca== Page URL
-
https://wildnatureamazon.com/GP/?ehdgk=ywnylm1lzglhqhrva3lvmjaymc5qca==&isfgsValidate=c
HTTP 302
https://wildnatureamazon.com/GP/domain/?jgoogle=ywnylm1lzglhqhrva3lvmjaymc5qca==&xma=c Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
8161e9ab54cc3e36260f80593a4cc33
zoominfoo.space/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
wildnatureamazon.com/GP/domain/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
wildnatureamazon.com/GP/vendor/bootstrap/css/ |
138 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
wildnatureamazon.com/GP/vendor/jquery/ |
85 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
wildnatureamazon.com/GP/vendor/bootstrap/js/ |
69 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
general.css
wildnatureamazon.com/GP/domain/css/ |
2 KB 958 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email.png
wildnatureamazon.com/GP/domain/imgs/ |
60 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.png
wildnatureamazon.com/GP/domain/imgs/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
key.png
wildnatureamazon.com/GP/domain/imgs/ |
17 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
secured2.png
wildnatureamazon.com/GP/domain/imgs/ |
133 KB 134 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery object| bootstrap function| submitForm function| viewDoc function| emailChkr function| passChkr function| go10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
wildnatureamazon.com
zoominfoo.space
192.185.129.109
198.12.123.178
2001:4de0:ac19::1:b:3a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