main.dnryov2fkyjam.amplifyapp.com
Open in
urlscan Pro
13.32.25.122
Malicious Activity!
Public Scan
Submission: On April 12 via manual from US
Summary
TLS certificate: Issued by Amazon on April 9th 2021. Valid for: a year.
This is the only time main.dnryov2fkyjam.amplifyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: IRS (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 13.32.25.122 13.32.25.122 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 1 |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-25-122.fra56.r.cloudfront.net
main.dnryov2fkyjam.amplifyapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
amplifyapp.com
main.dnryov2fkyjam.amplifyapp.com |
18 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
7 | main.dnryov2fkyjam.amplifyapp.com |
main.dnryov2fkyjam.amplifyapp.com
|
7 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.irs.gov |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.dnryov2fkyjam.amplifyapp.com Amazon |
2021-04-09 - 2022-05-08 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://main.dnryov2fkyjam.amplifyapp.com/
Frame ID: 98E65B2B31381C1A7627B57C3A80E451
Requests: 6 HTTP requests in this frame
Frame:
https://main.dnryov2fkyjam.amplifyapp.com/img/IFormPage.htm
Frame ID: 4AD189E8D02C504561B7DB4998E2B1B9
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers via /\(CloudFront\)$/i
- headers server /^AmazonS3$/i
Amazon Cloudfront (CDN) Expand
Detected patterns
- headers via /\(CloudFront\)$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: espa�ol
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
main.dnryov2fkyjam.amplifyapp.com/ |
17 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
efp.css
main.dnryov2fkyjam.amplifyapp.com/img/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
windows.js
main.dnryov2fkyjam.amplifyapp.com/img/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
inputSharedSecrets.js
main.dnryov2fkyjam.amplifyapp.com/img/ |
141 B 521 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
irslogo.gif
main.dnryov2fkyjam.amplifyapp.com/img/ |
7 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qMarkNew.gif
main.dnryov2fkyjam.amplifyapp.com/img/ |
223 B 595 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
IFormPage.htm
main.dnryov2fkyjam.amplifyapp.com/img/ Frame 4AD1 |
337 B 709 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: IRS (Government)42 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| privacyWindow object| privacySecWindow object| win number| timerId number| timeout number| timeLeft object| expireWindow string| reset function| noConfirm function| privacy_securitypolicy function| openHelp function| openHelpTopic function| closeWindow function| printWindow function| renewSession function| startTimeOut function| warnuser function| expireSession function| submitAction function| onBeforeUnload function| checkForExitButton function| catchBrowserClose function| showCloseButton function| toggleHeaderLinks string| errs string| summary function| checkCountry function| isNumberKey function| autoTab function| checkErrors function| updateTableSummary function| toggleHelpTopics0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
main.dnryov2fkyjam.amplifyapp.com
13.32.25.122
19b53609ada692284760ede248a8105cf4246c9ba8006cc8f5b1421ba8143001
4ad2f3e6f465e153b6bd72b7ee41fa261147894fa96046a04b09806a85321dec
6b8d097d0f3b0a49a85f2cd82bd899d22b7457788abf3cae8d63adcb18f4cb49
80fa495c9934e3991d6d33f24e7f2e13f67fe76b6920a0d5e75ebd4401d9ea64
95466e90dc19353fe56c1a0e243c80cdc40f25d861feeb771dae9eee218e38df
f566d208aea6ddcb17377572027869b1d0a0f81afd9dd6ffb52a36508741a825
fd857e3d1447b8ca7fe8bbab145784b7bd85e142e2c6a68960e6df1549cf1e3d