xv1ru0.com
Open in
urlscan Pro
45.143.95.41
Malicious Activity!
Public Scan
Effective URL: https://xv1ru0.com/ap/signin.php?openid.pape.max_auth_age=0&openid.return_to=%ddeefcbaafc65bc914f0942c64577abe95ea9e1e
Submission: On March 04 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on March 3rd 2023. Valid for: 3 months.
This is the only time xv1ru0.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon (Online) Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 45.143.95.41 45.143.95.41 | 29470 (RETNNET-AS) (RETNNET-AS) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
xv1ru0.com
1 redirects
xv1ru0.com |
108 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
11 | xv1ru0.com |
1 redirects
xv1ru0.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
xv1ru0.com R3 |
2023-03-03 - 2023-06-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://xv1ru0.com/ap/signin.php?openid.pape.max_auth_age=0&openid.return_to=%ddeefcbaafc65bc914f0942c64577abe95ea9e1e
Frame ID: 7C8D3D79A0B1CC9E4C7FAA3494DBC269
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
AmazonサインインPage URL History Show full URLs
-
https://xv1ru0.com/
HTTP 302
https://xv1ru0.com/ap/signin.php?openid.pape.max_auth_age=0&openid.return_to=%ddeefcbaafc65bc91... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://xv1ru0.com/
HTTP 302
https://xv1ru0.com/ap/signin.php?openid.pape.max_auth_age=0&openid.return_to=%ddeefcbaafc65bc914f0942c64577abe95ea9e1e Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
signin.php
xv1ru0.com/ap/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0c79e9da320f45529a3e6546090c8201.css
xv1ru0.com/ap/static/css/ |
130 KB 26 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9ebdfb9b9cba457183a9eee44433802a.css
xv1ru0.com/ap/static/css/ |
36 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11pxfkbmcrl.css
xv1ru0.com/ap/static/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main-style.css
xv1ru0.com/ap/static/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
xv1ru0.com/ap/static/js/ |
87 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6c7247b40839404aadca53196aba9885.gif
xv1ru0.com/ap/static/picture/ |
43 B 247 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pointer.png
xv1ru0.com/ap/static/images/ |
181 B 386 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mpgmt0r6ietyiee.png
xv1ru0.com/ap/static/images/ |
27 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
eyzhm86n6zcdpta.png
xv1ru0.com/ap/static/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon (Online) Amazon Japan (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
xv1ru0.com/ | Name: PHPSESSID Value: hjq0g6hov7q5pos23eij5mosq4 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
xv1ru0.com
45.143.95.41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