Submitted URL: http://minecraft.yokohama/
Effective URL: https://minecraft.yokohama/
Submission Tags: phish.gg anti.fish automated Search All
Submission: On February 20 via api from DE — Scanned from JP

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 110.3.34.134, located in Shimizusawa, Japan and belongs to FBDC FreeBit Co.,Ltd., JP. The main domain is minecraft.yokohama.
TLS certificate: Issued by R3 on December 22nd 2023. Valid for: 3 months.
This is the only time minecraft.yokohama was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 110.3.34.134 10013 (FBDC Free...)
1 1
Apex Domain
Subdomains
Transfer
2 minecraft.yokohama
minecraft.yokohama
955 B
1 1
Domain Requested by
2 minecraft.yokohama 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
prominence.tv
R3
2023-12-22 -
2024-03-21
3 months crt.sh

This page contains 1 frames:

Primary Page: https://minecraft.yokohama/
Frame ID: F691C44F2BC1EE4E6417777830C0AA13
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

403 Forbidden

Page URL History Show full URLs

  1. http://minecraft.yokohama/ HTTP 301
    https://minecraft.yokohama/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://minecraft.yokohama/ HTTP 301
    https://minecraft.yokohama/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
minecraft.yokohama/
Redirect Chain
  • http://minecraft.yokohama/
  • https://minecraft.yokohama/
580 B
744 B
Document
General
Full URL
https://minecraft.yokohama/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
110.3.34.134 Shimizusawa, Japan, ASN10013 (FBDC FreeBit Co.,Ltd., JP),
Reverse DNS
134.34.3.110.ap.yournet.ne.jp
Software
nginx/1.14.0 (Ubuntu) /
Resource Hash
1d5354282b909b9bd9c666fdffbf73327c41bd6e43bd55fbb7c08920a4b13b66

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/121.0.6167.184 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

Connection
keep-alive
Content-Length
580
Content-Type
text/html
Date
Tue, 20 Feb 2024 23:47:24 GMT
Server
nginx/1.14.0 (Ubuntu)

Redirect headers

Connection
keep-alive
Content-Length
194
Content-Type
text/html
Date
Tue, 20 Feb 2024 23:47:24 GMT
Location
https://minecraft.yokohama/
Server
nginx/1.14.0 (Ubuntu)

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://minecraft.yokohama/
Message:
Failed to load resource: the server responded with a status of 403 (Forbidden)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

minecraft.yokohama
110.3.34.134
1d5354282b909b9bd9c666fdffbf73327c41bd6e43bd55fbb7c08920a4b13b66