s3.us-east-2.amazonaws.com
Open in
urlscan Pro
52.219.106.225
Malicious Activity!
Public Scan
Effective URL: https://s3.us-east-2.amazonaws.com/protocolprompttohappen.core/onedrivefile.html
Submission: On July 09 via manual from GB — Scanned from GB
Summary
TLS certificate: Issued by Amazon RSA 2048 M01 on February 29th 2024. Valid for: a year.
This is the only time s3.us-east-2.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 34.117.197.73 34.117.197.73 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
2 | 52.219.106.225 52.219.106.225 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a06:98c1:312... 2a06:98c1:3121::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 3 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 73.197.117.34.bc.googleusercontent.com
delivery.nento.com |
ASN16509 (AMAZON-02, US)
PTR: s3.us-east-2.amazonaws.com
s3.us-east-2.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
amazonaws.com
s3.us-east-2.amazonaws.com |
12 KB |
1 |
dynadobedoc.info
setbymost.dynadobedoc.info |
249 KB |
1 |
nento.com
1 redirects
delivery.nento.com |
830 B |
3 | 3 |
Domain | Requested by | |
---|---|---|
2 | s3.us-east-2.amazonaws.com | |
1 | setbymost.dynadobedoc.info |
s3.us-east-2.amazonaws.com
|
1 | delivery.nento.com | 1 redirects |
3 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.us-east-2.amazonaws.com Amazon RSA 2048 M01 |
2024-02-29 - 2025-02-12 |
a year | crt.sh |
dynadobedoc.info WE1 |
2024-06-28 - 2024-09-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://s3.us-east-2.amazonaws.com/protocolprompttohappen.core/onedrivefile.html
Frame ID: B04BDE00EAB123090A9148015B4B5681
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
Verify Your IdentityPage URL History Show full URLs
-
http://delivery.nento.com/WQNDTXYE?id=142679=IkhUVw1UVQQMRAdUVlANVFINAFcBUFYKVwZQAwFWAABUUFIEDlUBAABcV...
HTTP 307
https://delivery.nento.com/WQNDTXYE?id=142679=IkhUVw1UVQQMRAdUVlANVFINAFcBUFYKVwZQAwFWAABUUFIEDlUBAABcV... HTTP 302
https://s3.us-east-2.amazonaws.com/protocolprompttohappen.core/onedrivefile.html Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://delivery.nento.com/WQNDTXYE?id=142679=IkhUVw1UVQQMRAdUVlANVFINAFcBUFYKVwZQAwFWAABUUFIEDlUBAABcVwRSDQ8BVA0eWVQXFlIfWUETEFoKTCFQDRRcBRdfXFZTVkVaTUIfWw0bQAkYAgYGBFJVBFsCVgBSUwpUUgJJUEJFRw8XHVVdDlxDBxZKH1pRDxZcTFYOWUsxaCgnZ21hcw5eUUREAg==&fl=CUAQFkpcTBxGCxhERBhdU0JMTwcbAwlSS1taABVATFYOWUsWSwkXXFZXWkFFWlVCRUwNXVQSFFZfGlcOEFZNWg9RABRQEAZVXFRTH19BVV4=
HTTP 307
https://delivery.nento.com/WQNDTXYE?id=142679=IkhUVw1UVQQMRAdUVlANVFINAFcBUFYKVwZQAwFWAABUUFIEDlUBAABcVwRSDQ8BVA0eWVQXFlIfWUETEFoKTCFQDRRcBRdfXFZTVkVaTUIfWw0bQAkYAgYGBFJVBFsCVgBSUwpUUgJJUEJFRw8XHVVdDlxDBxZKH1pRDxZcTFYOWUsxaCgnZ21hcw5eUUREAg==&fl=CUAQFkpcTBxGCxhERBhdU0JMTwcbAwlSS1taABVATFYOWUsWSwkXXFZXWkFFWlVCRUwNXVQSFFZfGlcOEFZNWg9RABRQEAZVXFRTH19BVV4= HTTP 302
https://s3.us-east-2.amazonaws.com/protocolprompttohappen.core/onedrivefile.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
onedrivefile.html
s3.us-east-2.amazonaws.com/protocolprompttohappen.core/ Redirect Chain
|
11 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
word.png
setbymost.dynadobedoc.info/paradise/admin/js/i/ |
248 KB 249 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
s3.us-east-2.amazonaws.com/ |
243 B 520 B |
Other
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| continueLoading function| validateEmail0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
delivery.nento.com
s3.us-east-2.amazonaws.com
setbymost.dynadobedoc.info
2a06:98c1:3121::3
34.117.197.73
52.219.106.225
53c984192d5e67c9b5b173d24c7a7564b6884f4e2d870e875db90c8154f5b391
6f699434b417e4228fb4d19984b781e9abc9474ea5b1439e891efb4f070981d1
e0f59b2b584701d315ca0fb85a13785e3c584837803d80f896db4b22214481dc
ff0407d4ec832e14fba9171bc288d0c481c956af888cba44382d147c0dbae6f9