shad.bangbuxw.info
Open in
urlscan Pro
152.32.156.248
Public Scan
Effective URL: https://shad.bangbuxw.info/404.html
Submission Tags: phishing amazon Search All
Submission: On August 22 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 22nd 2023. Valid for: 3 months.
This is the only time shad.bangbuxw.info was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 104.21.33.2 104.21.33.2 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 5 | 152.32.156.248 152.32.156.248 | 135377 (UCLOUD-HK...) (UCLOUD-HK-AS-AP UCLOUD INFORMATION TECHNOLOGY HK LIMITED) | |
4 | 2 |
ASN135377 (UCLOUD-HK-AS-AP UCLOUD INFORMATION TECHNOLOGY HK LIMITED, HK)
shad.bangbuxw.info |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
bangbuxw.info
2 redirects
shad.bangbuxw.info |
4 KB |
1 |
opklsawi.com
1111.opklsawi.com |
494 B |
4 | 2 |
Domain | Requested by | |
---|---|---|
5 | shad.bangbuxw.info |
2 redirects
1111.opklsawi.com
shad.bangbuxw.info |
1 | 1111.opklsawi.com | |
4 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
opklsawi.com E1 |
2023-08-17 - 2023-11-15 |
3 months | crt.sh |
zhoux.qiandongnanxw.info R3 |
2023-08-22 - 2023-11-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://shad.bangbuxw.info/404.html
Frame ID: B304EFFA45B370FD1B3F5F9D1F25F67C
Requests: 4 HTTP requests in this frame
Screenshot
Page Title
404Page URL History Show full URLs
- https://1111.opklsawi.com/caonigee5bed6fc9f93b4585794393feaadb122 Page URL
- https://shad.bangbuxw.info/ Page URL
-
https://shad.bangbuxw.info/index.php?t=fa9ae825f477d50a505d10bca0b39590305e546600e8c324edb29909084f9139
HTTP 302
https://shad.bangbuxw.info/index12.php HTTP 302
https://shad.bangbuxw.info/404.html Page URL
Detected technologies
Akamai Bot Manager (Security) ExpandDetected patterns
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://1111.opklsawi.com/caonigee5bed6fc9f93b4585794393feaadb122 Page URL
- https://shad.bangbuxw.info/ Page URL
-
https://shad.bangbuxw.info/index.php?t=fa9ae825f477d50a505d10bca0b39590305e546600e8c324edb29909084f9139
HTTP 302
https://shad.bangbuxw.info/index12.php HTTP 302
https://shad.bangbuxw.info/404.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
caonigee5bed6fc9f93b4585794393feaadb122
1111.opklsawi.com/ |
66 B 494 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
shad.bangbuxw.info/ |
1 KB 1016 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.23238u92u82.js
shad.bangbuxw.info/vendor/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
404.html
shad.bangbuxw.info/ Redirect Chain
|
487 B 431 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
shad.bangbuxw.info/ | Name: PHPSESSID Value: ga7a56ud6cs7irlmj37b1fpa2q |
|
.shad.bangbuxw.info/ | Name: 62345ba76168db0033ce8ae6a90ce5a762956614 Value: nwcMGFHjQc7nDOZDxhWlbg%3D%3D |
|
.shad.bangbuxw.info/ | Name: _amkc Value: 211634db-5ee1-4fb3-b37c-ce25e5f56210 |
|
.shad.bangbuxw.info/ | Name: ak_bmsc Value: 4zeEvajla5VXwOLAS9VKljHa1j%2FCVXq%2BcLs395e7QPeN%2F80JsIJFL21ZfNCWelXD9fZF2pTrAVRpAJxPBeJhsf8syW4dMVDCaT3WAjcTwl2l7ZQjlajnlJkh7yb%2FFKX3O6%2FJtOCkwQcYguDpVQ%2BVbJYYJBW5%2FBNbY1a6YQHHVe72BVoASYO%2BznKTNH8wr8PCioQTDfyPQMsPSsxsb133%2F5IXR%2Bb%2Bl2bueFdIad8Sczu3ATmVhotYa%2BdlK9xKuxNSacCW6KjK4wWlN8SM2TnM5a7UULlXnjU3UjB4go8jwTJQqqOXh%2Fo4SfoPMluyov4orclcj3%2FKdRR1YxOYp9HPOvBhhpecG9SRaonKM5ZroxOZHj%2FLeKt7zZjbUX4HJrG6PPTgH%2FXrhofbXZ3hGXxvyKG%2B23OWflb5WpGlaAc59jFP3ZyrE727HtIwSqVVjTTg3WTWDczHGWqmt3XYbtCHCN9B3XiNtmn9YXoeN4lCCl5%2Fs3gL%2Bv1%2B4KzARZdbMEQik1gqcWjfuAeDritHpMouAYHDqQ7GNe1c3PqWCnCNme5I8dT%2B7IfKDGcJI9xxlkIRzABIV6QIaYFusz0EWJw%2FmQFVGiUav51HQaT8HNLLBKLvUZO%2BHt9x%2ByU2OJnlzKCNEhPMPgvfD8UlW1HilVjaPSayTL778YsvfOP8b9Q8oVuPNWFzaRnTf5j8jZfXkUnJuwyhgu14X3NBptGObXKtWPRxK%2BkpWEZnptoR4%2F1EYamzz0Qo2zRDK6io2Bt6vWs4SAIPp7S4skPlprhloT4qzA%3D%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1111.opklsawi.com
shad.bangbuxw.info
104.21.33.2
152.32.156.248
0a890667a27e18c65cde62ecb0f8404fcaac357c9ebbf8f19f92066c03e6a149
50629d231673e784aec8182d6ecac383674a054fb68f7196a68e304195d4272f
ae9da3c9a568a7b3602dc54e10c324166db3abe1d3a6892770d6ce6a7cc8c1c6