www.kzbazaar.com
Open in
urlscan Pro
181.215.27.25
Malicious Activity!
Public Scan
Submission: On July 14 via automatic, source phishtank
Summary
This is the only time www.kzbazaar.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 181.215.27.25 181.215.27.25 | 61440 (Digital E...) (Digital Energy Technologies Chile SpA) | |
1 | 2a00:1450:400... 2a00:1450:4001:81d::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
1 | 2.18.233.20 2.18.233.20 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
2 | 2a00:1450:400... 2a00:1450:4001:81d::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
19 | 5 |
ASN61440 (Digital Energy Technologies Chile SpA, CL)
www.kzbazaar.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a2-18-233-20.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
kzbazaar.com
www.kzbazaar.com |
247 KB |
2 |
gstatic.com
fonts.gstatic.com |
16 KB |
1 |
paypalobjects.com
www.paypalobjects.com |
69 KB |
1 |
googleapis.com
fonts.googleapis.com |
681 B |
19 | 4 |
Domain | Requested by | |
---|---|---|
8 | www.kzbazaar.com |
www.kzbazaar.com
|
2 | fonts.gstatic.com |
www.kzbazaar.com
|
1 | www.paypalobjects.com |
www.kzbazaar.com
|
1 | fonts.googleapis.com |
www.kzbazaar.com
|
19 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/myaccount/settings/index.php
Frame ID: E9B97D1C8FD3B1B75001975C567B854E
Requests: 19 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
index.php
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/myaccount/settings/ |
13 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
css
fonts.googleapis.com/ |
3 KB 681 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
G-Z118.css
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/css/ |
50 KB 50 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/js/ |
84 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.js
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/js/ |
45 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.additional-methods.js
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/js/ |
22 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.v-form.js
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/js/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.CardValidator.js
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/js/ |
6 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/js/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
A4F0G5Z846G.jpg
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite_countries_flag4.png
www.paypalobjects.com/webstatic/mktg/icons/ |
68 KB 69 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
vv.gif
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
ieVl2ZhZI2eCN5jzbjEETS9weq8-19K7DQk6YvM.woff2
fonts.gstatic.com/s/robotocondensed/v16/ |
10 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
sprites_cc_logos.png
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PayPalSansBig-Light.woff2
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/css/font/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
superbowlAsset.png
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PayPalSansBig-Regular.woff2
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/css/font/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ppcom-white.svg
www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
ieVl2ZhZI2eCN5jzbjEETS9weq8-19G7DQk6YvNkeg.woff2
fonts.gstatic.com/s/robotocondensed/v16/ |
5 KB 5 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/A4F0G5Z846G.jpg
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/vv.gif
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/sprites_cc_logos.png
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/css/font/PayPalSansBig-Light.woff2
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/superbowlAsset.png
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/css/font/PayPalSansBig-Regular.woff2
- Domain
- www.kzbazaar.com
- URL
- http://www.kzbazaar.com/uppdaate/suppoorte/summray/updddatee/questi/lib/img/ppcom-white.svg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
www.kzbazaar.com
www.paypalobjects.com
www.kzbazaar.com
181.215.27.25
2.18.233.20
2a00:1450:4001:81d::2003
2a00:1450:4001:81d::200a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