![](/screenshots/f78ba986-5bc9-44f1-9946-28c07adb86a9.png)
dev6416.d3h5z16baz0w9e.amplifyapp.com
Open in
urlscan Pro
18.65.168.16
Malicious Activity!
Public Scan
Submission: On September 29 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on September 27th 2023. Valid for: a year.
This is the only time dev6416.d3h5z16baz0w9e.amplifyapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: 1&1 Ionos (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 18.65.168.16 18.65.168.16 | 16509 (AMAZON-02) (AMAZON-02) | |
6 | 213.165.66.58 213.165.66.58 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 | 217.160.86.27 217.160.86.27 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 | 2404:6800:400... 2404:6800:4004:823::200a | 15169 (GOOGLE) (GOOGLE) | |
9 | 4 |
ASN16509 (AMAZON-02, US)
PTR: server-18-65-168-16.nrt57.r.cloudfront.net
dev6416.d3h5z16baz0w9e.amplifyapp.com |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
PTR: ce1.uicdn.net
ce1.uicdn.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
uicdn.net
ce1.uicdn.net — Cisco Umbrella Rank: 231974 ias.uicdn.net — Cisco Umbrella Rank: 410111 |
299 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 720 |
31 KB |
1 |
amplifyapp.com
dev6416.d3h5z16baz0w9e.amplifyapp.com |
15 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
6 | ce1.uicdn.net |
dev6416.d3h5z16baz0w9e.amplifyapp.com
ce1.uicdn.net |
1 | ajax.googleapis.com |
dev6416.d3h5z16baz0w9e.amplifyapp.com
|
1 | ias.uicdn.net |
dev6416.d3h5z16baz0w9e.amplifyapp.com
|
1 | dev6416.d3h5z16baz0w9e.amplifyapp.com | |
9 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ionos.com |
ias.ionos.com |
my.ionos.com |
hidrive.ionos.com |
archive.ionos.com |
www.ionos-status.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.d3h5z16baz0w9e.amplifyapp.com Amazon RSA 2048 M02 |
2023-09-27 - 2024-10-25 |
a year | crt.sh |
ce1.uicdn.net GeoTrust RSA CA 2018 |
2023-03-03 - 2024-04-02 |
a year | crt.sh |
ias.uicdn.net GeoTrust TLS RSA CA G1 |
2023-05-15 - 2024-06-14 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-09-04 - 2023-11-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dev6416.d3h5z16baz0w9e.amplifyapp.com/
Frame ID: F00CFD18EDF071DB5494AB19A1E7D00D
Requests: 9 HTTP requests in this frame
16 Outgoing links
These are links going to different origins than the main page.
Title: Webmail
Search URL Search Domain Scan URL
Title: Forgot your password?
Search URL Search Domain Scan URL
Title: Remember me
Search URL Search Domain Scan URL
Title: Learn more
Search URL Search Domain Scan URL
Title: iOS
Search URL Search Domain Scan URL
Title: Android
Search URL Search Domain Scan URL
Title: Thunderbird
Search URL Search Domain Scan URL
Title: Outlook
Search URL Search Domain Scan URL
Title: Apple Mail
Search URL Search Domain Scan URL
Title: email programs (POP/IMAP)
Search URL Search Domain Scan URL
Title: My IONOS
Search URL Search Domain Scan URL
Title: HiDrive
Search URL Search Domain Scan URL
Title: Email archiving
Search URL Search Domain Scan URL
Title: All Systems Operational
Search URL Search Domain Scan URL
Title: IONOS Inc. • 2023
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
dev6416.d3h5z16baz0w9e.amplifyapp.com/ |
54 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionos.min.css
ce1.uicdn.net/exos/framework/1.2/ |
288 KB 38 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
email-marketing.svg
ias.uicdn.net/fileadmin/IONOS/user_upload/ |
9 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.4.1/ |
86 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
exos-icon-font.woff
ce1.uicdn.net/exos/icons/ |
50 KB 50 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 63 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-regular.woff
ce1.uicdn.net/exos/fonts/overpass/ |
42 KB 42 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-bold.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 62 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-bold.woff
ce1.uicdn.net/exos/fonts/overpass/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: 1&1 Ionos (Telecommunication)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery number| counter0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
ce1.uicdn.net
dev6416.d3h5z16baz0w9e.amplifyapp.com
ias.uicdn.net
18.65.168.16
213.165.66.58
217.160.86.27
2404:6800:4004:823::200a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