https://bossnet.az/portal/medieval-competitors-voting-authentication-v5a4v1d9q7q1i9n4i9y1xxs
185.32.47.214 · Bossnet LLC
Baku, Azerbaijan
—
200 · 27.3s
Valid· R13, Let's Encrypt, US
COMPLETED
Domain Intelligence: bossnet.az
Scanned 4 times since Mar 9, 2026, 12:41 PM UTC
No KB/IOK detections were recorded for this scan.
finance | technology | ecommerce | cryptocurrency | social_media | gaming · 4/5/2026
This site at bossnet.az is impersonating a login portal with a redirect to a login page, likely aiming to harvest credentials. The page title redirects users and the static HTML shows no forms, but the SPA-like structure and numerous asset requests suggest credential capture via JavaScript. The domain appears unrelated to any widely known brand and features a misleading redirect prompt, indicating phishing/impersonation behavior.
The site is highly suspicious and should be treated as malicious. The domain bossnet.az is providing a redirect-laden SPA that renders a login interface via JavaScript, with no static login form present in the initial HTML. The page content and assets indicate an impersonation of a branded login experience, designed to capture user credentials once the SPA loads the login UI. The SSL certificate is legitimate but newly issued; combined with the active redirect script and host-only asset loading, this strongly suggests a credential phishing operation targeting users who land on the page. Given the lack of brand signals in the domain itself and the explicit redirect to a login URL, this is a credible credential phishing page intended to harvest credentials from unsuspecting users.
Suspend Domain