xrxbqw9.zgjcz.com.cn
Open in
urlscan Pro
35.236.78.86
Malicious Activity!
Public Scan
Submission: On June 14 via api from PH
Summary
This is the only time xrxbqw9.zgjcz.com.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 17 | 35.236.78.86 35.236.78.86 | 15169 (GOOGLE) (GOOGLE) | |
3 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 2a00:1450:400... 2a00:1450:4001:82a::2001 | 15169 (GOOGLE) (GOOGLE) | |
1 2 | 151.101.12.193 151.101.12.193 | 54113 (FASTLY) (FASTLY) | |
2 | 103.235.46.191 103.235.46.191 | 55967 (BAIDU Bei...) (BAIDU Beijing Baidu Netcom Science and Technology Co.) | |
27 | 5 |
ASN15169 (GOOGLE, US)
PTR: 86.78.236.35.bc.googleusercontent.com
xrxbqw9.zgjcz.com.cn |
ASN55967 (BAIDU Beijing Baidu Netcom Science and Technology Co., Ltd., CN)
hm.baidu.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
zgjcz.com.cn
1 redirects
xrxbqw9.zgjcz.com.cn |
89 KB |
5 |
blogspot.com
1.bp.blogspot.com |
296 KB |
3 |
cloudflare.com
cdnjs.cloudflare.com |
48 KB |
2 |
baidu.com
hm.baidu.com |
16 KB |
2 |
imgur.com
1 redirects
i.imgur.com |
949 B |
27 | 5 |
Domain | Requested by | |
---|---|---|
17 | xrxbqw9.zgjcz.com.cn |
1 redirects
xrxbqw9.zgjcz.com.cn
cdnjs.cloudflare.com |
5 | 1.bp.blogspot.com |
xrxbqw9.zgjcz.com.cn
|
3 | cdnjs.cloudflare.com |
xrxbqw9.zgjcz.com.cn
|
2 | hm.baidu.com |
xrxbqw9.zgjcz.com.cn
|
2 | i.imgur.com |
1 redirects
xrxbqw9.zgjcz.com.cn
|
27 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2021-05-17 - 2021-08-09 |
3 months | crt.sh |
*.imgur.com DigiCert SHA2 Secure Server CA |
2020-01-15 - 2022-03-16 |
2 years | crt.sh |
baidu.com GlobalSign Organization Validation CA - SHA256 - G2 |
2020-10-20 - 2021-07-26 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://xrxbqw9.zgjcz.com.cn/amazon/
Frame ID: D5CD902AC6D6878220F06671E9306E2F
Requests: 27 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://xrxbqw9.zgjcz.com.cn/amazon
HTTP 301
http://xrxbqw9.zgjcz.com.cn/amazon/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://xrxbqw9.zgjcz.com.cn/amazon
HTTP 301
http://xrxbqw9.zgjcz.com.cn/amazon/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://i.imgur.com/mov9JFN.png HTTP 302
- https://i.imgur.com/removed.png
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
xrxbqw9.zgjcz.com.cn/amazon/ Redirect Chain
|
67 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.5.1/ |
87 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.6.0/js/ |
62 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
xrxbqw9.zgjcz.com.cn/amazon/css/ |
150 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
time.js
xrxbqw9.zgjcz.com.cn/amazon/js/ |
48 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
onWPk80.png
1.bp.blogspot.com/-CNNZ2QLyO18/X_2kBbRQtyI/AAAAAAAAAtw/LDdi1hvimIgqPkCqGFN1rT78x54LNRFqgCLcBGAsYHQ/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
%25E7%25BB%2584%2B5%25402x.png
1.bp.blogspot.com/-DtTXaj4Y4CU/YFRYHdQ7UQI/AAAAAAAAACY/HyzRdPHzUgAQaTmAGLDFdzIZk4uA-KoLwCLcBGAsYHQ/s16000/ |
208 KB 209 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spin-up.png
1.bp.blogspot.com/-nL7smWDu9vw/X_2jobwR3FI/AAAAAAAAAtc/h4V88bNWps8d3QoTeRT69lSy5EAwMRHzACLcBGAsYHQ/ |
33 KB 33 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spin-down.png
1.bp.blogspot.com/-2kSbsvFGP0Q/X_2joOCQ34I/AAAAAAAAAtY/UG57dy4-ZUwymUp6HrjVX3PVNjZMzfSMQCLcBGAsYHQ/ |
31 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
removed.png
i.imgur.com/ Redirect Chain
|
503 B 711 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
like.png
xrxbqw9.zgjcz.com.cn/amazon/img/ |
469 B 772 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
1 KB 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
11.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
10.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
3 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
2 KB 3 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7.jpg
xrxbqw9.zgjcz.com.cn/amazon/img/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
yuming.php
xrxbqw9.zgjcz.com.cn/amazon/ |
483 B 507 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_.png
1.bp.blogspot.com/-Ybcjl-XGNc4/YEj3-sn0UNI/AAAAAAAAAXA/jHxxMUCtiIgaqtp80p1kTLm1cwkCWBYeACLcBGAsYHQ/s16000/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hm.js
hm.baidu.com/ |
42 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hm.gif
hm.baidu.com/ |
43 B 299 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)65 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| Popper object| bootstrap function| set_Cookie function| get_Cookie function| getQueryString function| spinnerAction function| hh1 function| jp function| fh function| wxalert number| maxParticleCount number| particleSpeed function| startConfetti function| stopConfetti function| toggleConfetti function| removeConfetti string| brand_country object| dayNames object| monthNames string| minutos_y string| segundos object| google_tag_data function| ga object| gaplugins function| getBrowser function| getPlatform object| ques boolean| spin2enabled function| startSpin function| spin2 string| tipnstr string| alertTip number| value string| appName string| theme boolean| g_banner_ad function| showShare function| fn1_a function| incrementValue_a function| chooseApp function| incrementValue1 function| incrementValue_i function| fn1_i function| lasthtml function| dapp function| tipn string| j string| banner object| _hmt string| tiaoban string| cad string| bad string| tj string| ead boolean| _bdhm_loaded_9c00d60763ab1c981b7bf2343c65c06a object| mini_tangram_log_3t9cmi2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.xrxbqw9.zgjcz.com.cn/ | Name: Hm_lpvt_9c00d60763ab1c981b7bf2343c65c06a Value: 1623636504 |
|
.xrxbqw9.zgjcz.com.cn/ | Name: Hm_lvt_9c00d60763ab1c981b7bf2343c65c06a Value: 1623636504 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1.bp.blogspot.com
cdnjs.cloudflare.com
hm.baidu.com
i.imgur.com
xrxbqw9.zgjcz.com.cn
103.235.46.191
151.101.12.193
2606:4700::6810:135e
2a00:1450:4001:82a::2001
35.236.78.86
039cd157b91ff7172945e15d6665f4e26b0f0f7a6934c68e5059e4e88c1928fd
0bc332350319c700801be0a24c42ca01b2e32f2eed889066e7c3b5cbc57358b4
0e4c3d99efa3b2c5bc62e7e9775f6df76aedb4439717f62dea63e33855dfac92
0f7476367287cf4091b0ab6504a2dadc508a8f7dfe86970bc8435f9161b1229a
1a381623bd87f77b8b642d150404adf1f6edba167de3caa88cccf0385791b2e3
1a8e2b3b26eb70b3ad90edab6ee80d55f4ec4b5dc4f6645512ade4f328e056e4
26b68300135dab58b5cf249e3f78d4d7e73e7f1997ddb3c58ecb19b6e476cb9f
2f020978a98d5bd1b675df1e9aacd3dbf79a1d8746829ae0f2b4c2487496924c
458eacae8cbb4433ce8877e5451b91893e03b82bdd41c099cde7874e053f9306
6a519393f80b19ef03f6c0109a5fb4290a05515894575cfd53914e0e9d396e2b
7d574a634edf122a4b81236bb88d53d42cb7a788e4acc27db31307782b873b1e
8faa2373bb49912f7d74e626c6fa9cc959c1e75496accc6fa5658a67f0082b73
9860f4ce37af4594415edd7ff4b0a83d5fb72e9175cfd748e2254133a86cf17e
9b17d1bc53a49edcab5f29c232dde056d8ad18b6c948ad908134b64130eb2606
9b5936f4006146e4e1e9025b474c02863c0b5614132ad40db4b925a10e8bfbb9
9c011c08f7f60833d800770d996050b2fbef66582f0e0e775487048f40c31aeb
a52f7aa54d7bcaafa056ee0a050262dfc5694ae28dee8b4cac3429af37ff0d66
b00a85165f29c47a0ef5fda452411943a4f9db7f9ca06a4c34a93bf6488cfc9d
b21392c458f660538ee51574db0fc155d0d3789abbf18894893334bcb71345e3
c1b947122d05ae86afd974627f415444af4f1d76c84bdbf5f4d6dc26d79ddfa8
c3ba4b8f1b708bf9fb64f6b530ffea5feb0ec53711ea00cd58ac7fa295e528ce
cf4724b2f736ed1a0ae6bc28f1ead963d9cd2c1fd87b6ef32e7799fc1c5c8bda
d297a25f94e328794c4d6f473df9a512911aa10621e3173b07a98ffb96a2741a
edd03b96ae4ff7886406c59d7dfeeaa1b624a7da297bf2f92d0cb6b7f9633cba
f1da2626dd22d4a26e69dd5586eb3d7426368199fe96c284e04cbdb5ec212453
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
fba1dafda080b2bf2c0074fc8eb29203c48f2afa916065df41a0a76e48f63987