login-amz.bcdz.cc Open in urlscan Pro
204.44.83.123  Malicious Activity! Public Scan

URL: https://login-amz.bcdz.cc/
Submission: On July 08 via automatic, source certstream-suspicious

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 204.44.83.123, located in Los Angeles, United States and belongs to ASN-QUADRANET-GLOBAL, US. The main domain is login-amz.bcdz.cc.
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on July 6th 2020. Valid for: 3 months.
This is the only time login-amz.bcdz.cc was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: 16Shop (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 204.44.83.123 8100 (ASN-QUADR...)
1 2a01:4f9:2a:f... 24940 (HETZNER-AS)
2 2
Apex Domain
Subdomains
Transfer
1 freeiconspng.com
www.freeiconspng.com
9 KB
1 bcdz.cc
login-amz.bcdz.cc
725 B
2 2
Domain Requested by
1 www.freeiconspng.com login-amz.bcdz.cc
1 login-amz.bcdz.cc
2 2

This site contains no links.

Subject Issuer Validity Valid
bcdz.cc
ZeroSSL RSA Domain Secure Site CA
2020-07-06 -
2020-10-04
3 months crt.sh
www.freeiconspng.com
Sectigo RSA Domain Validation Secure Server CA
2019-12-24 -
2021-12-23
2 years crt.sh

This page contains 1 frames:

Primary Page: https://login-amz.bcdz.cc/
Frame ID: C063386D090C65F73070B7CF3D498336
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Debian/i

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

2
Requests

50 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

10 kB
Transfer

9 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
login-amz.bcdz.cc/
375 B
725 B
Document
General
Full URL
https://login-amz.bcdz.cc/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
204.44.83.123 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL, US),
Reverse DNS
204.44.83.123.static.quadranet.com
Software
Apache/2.4.25 (Debian) mod_fcgid/2.3.9 OpenSSL/1.0.2u /
Resource Hash
b7852a72787dea90410e8d7ec37f8b3937d5a9fd053315dda38956ca39d83106
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
login-amz.bcdz.cc
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 08 Jul 2020 08:23:01 GMT
Server
Apache/2.4.25 (Debian) mod_fcgid/2.3.9 OpenSSL/1.0.2u
Set-Cookie
PHPSESSID=tc7cvk9h8nfih3lstk3uc4dlk3; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Length
245
Connection
close
Content-Type
text/html; charset=UTF-8
error-icon-4.png
www.freeiconspng.com/uploads/
9 KB
9 KB
Image
General
Full URL
https://www.freeiconspng.com/uploads/error-icon-4.png
Requested by
Host: login-amz.bcdz.cc
URL: https://login-amz.bcdz.cc/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2a01:4f9:2a:f67::2 , Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
Software
nginx /
Resource Hash
63ae0113d05677d47e0c6cdd274b8667c5ce233fac4dcac0d4b8ea964207ac3f

Request headers

Referer
https://login-amz.bcdz.cc/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 08 Jul 2020 08:23:02 GMT
MS-Author-Via
DAV
Last-Modified
Tue, 14 Mar 2017 23:16:01 GMT
Server
nginx
ETag
"120a4a-228b-54ab902dd0e40"
Content-Type
image/png
Cache-Control
max-age=2592000, public, no-cache, must-revalidate
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
8843

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: 16Shop (Consumer)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
login-amz.bcdz.cc/ Name: PHPSESSID
Value: tc7cvk9h8nfih3lstk3uc4dlk3

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

login-amz.bcdz.cc
www.freeiconspng.com
204.44.83.123
2a01:4f9:2a:f67::2
63ae0113d05677d47e0c6cdd274b8667c5ce233fac4dcac0d4b8ea964207ac3f
b7852a72787dea90410e8d7ec37f8b3937d5a9fd053315dda38956ca39d83106