online.d15kut0qk1zf5q.amplifyapp.com
Open in
urlscan Pro
18.66.192.103
Malicious Activity!
Public Scan
Submission: On July 03 via manual from TW — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on July 2nd 2024. Valid for: a year.
This is the only time online.d15kut0qk1zf5q.amplifyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 18.66.192.103 18.66.192.103 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 192.229.133.221 192.229.133.221 | 15133 (EDGECAST) (EDGECAST) | |
4 | 3 |
ASN16509 (AMAZON-02, US)
PTR: server-18-66-192-103.muc50.r.cloudfront.net
online.d15kut0qk1zf5q.amplifyapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
amplifyapp.com
online.d15kut0qk1zf5q.amplifyapp.com |
729 KB |
1 |
w3schools.com
www.w3schools.com — Cisco Umbrella Rank: 22461 |
5 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 268 |
6 KB |
4 | 3 |
Domain | Requested by | |
---|---|---|
2 | online.d15kut0qk1zf5q.amplifyapp.com | |
1 | www.w3schools.com |
online.d15kut0qk1zf5q.amplifyapp.com
|
1 | cdnjs.cloudflare.com |
online.d15kut0qk1zf5q.amplifyapp.com
|
4 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.d15kut0qk1zf5q.amplifyapp.com Amazon RSA 2048 M03 |
2024-07-02 - 2025-07-31 |
a year | crt.sh |
cdnjs.cloudflare.com E1 |
2024-06-02 - 2024-08-31 |
3 months | crt.sh |
*.w3schools.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-04-03 - 2025-05-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://online.d15kut0qk1zf5q.amplifyapp.com/
Frame ID: F8439CDF4B1A039F538704557822AD4D
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Authentication ...Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
online.d15kut0qk1zf5q.amplifyapp.com/ |
1 MB 365 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
w3.css
www.w3schools.com/w3css/4/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
online.d15kut0qk1zf5q.amplifyapp.com/images/ |
1 MB 365 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
July 12th 2024, 11:15:14 am
UTC —
From United States
Threats:
Spearphishing
Comment: This kit dynamically generates the phishing page given the victim's email address domain.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 undefined| event object| fence object| sharedStorage object| _0x8a4a function| waitForElm0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
online.d15kut0qk1zf5q.amplifyapp.com
www.w3schools.com
18.66.192.103
192.229.133.221
2606:4700::6811:190e
5a0497dbcb3f28caccd2a9e596a03dc8f862b5d85bf77adaca1a633646dd79ea
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
c4f2aba13970ecf8303fb9329f97c8824861569273b0aa27acce48abc61d04f5