www.amaezone-reg.com
Open in
urlscan Pro
154.92.17.22
Malicious Activity!
Public Scan
Effective URL: http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/login.php?p=0&token=7777772e616d61657a6f6e652d7265672e636f6d
Submission: On March 13 via manual from JP
Summary
This is the only time www.amaezone-reg.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Amazon Japan (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 18 | 154.92.17.22 154.92.17.22 | 133115 (HKKF-AS-A...) (HKKF-AS-AP hongkong kwaifong information service limited) | |
16 | 1 |
ASN133115 (HKKF-AS-AP hongkong kwaifong information service limited, HK)
www.amaezone-reg.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
amaezone-reg.com
2 redirects
www.amaezone-reg.com |
540 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
18 | www.amaezone-reg.com |
2 redirects
www.amaezone-reg.com
|
16 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/login.php?p=0&token=7777772e616d61657a6f6e652d7265672e636f6d
Frame ID: 9EA5D991E4E6668CB3CEC23E554D3661
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG
HTTP 301
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ HTTP 302
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/login.php?p=0&token=7777772e616d61657a6f6e6... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Perl (Programming Languages) Expand
Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_perl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_perl(?:\/([\d\.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_perl(?:\/([\d\.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG
HTTP 301
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ HTTP 302
http://www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/login.php?p=0&token=7777772e616d61657a6f6e652d7265672e636f6d Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
www.amaezone-reg.com/ |
0 507 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login.php
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ Redirect Chain
|
6 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
141 KB 142 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tnof.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.jpg
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/assets/img/ |
202 KB 202 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
POwrE.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ |
145 B 485 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IrYgm.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ |
462 B 803 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mpbVv.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ |
116 B 456 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
IcZQN.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ |
346 B 687 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpDZm.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ |
203 B 542 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
apQJR.css
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_002.js
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
48 KB 48 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_003.js
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
19 KB 19 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
95 KB 95 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Verdana.ttf
www.amaezone-reg.com/4o7KU6OJdi3lExmgyCMBRnY1aXHPQsSG/mix/ |
11 KB 11 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Amazon Japan (Online)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| bootstrap function| Popper function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.amaezone-reg.com
154.92.17.22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