www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net
Open in
urlscan Pro
104.223.4.203
Malicious Activity!
Public Scan
Effective URL: https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/funccode.php
Submission: On February 03 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 1st 2023. Valid for: 3 months.
This is the only time www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ETC (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 104.223.4.203 104.223.4.203 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 34.150.46.113 34.150.46.113 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
8 | 3 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 113.46.150.34.bc.googleusercontent.com
www.aini1314.shop |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
xiguazi.net
1 redirects
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net |
256 KB |
1 |
aini1314.shop
www.aini1314.shop |
356 B |
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net |
1 redirects
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net
|
1 | www.aini1314.shop |
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net R3 |
2023-02-01 - 2023-05-02 |
3 months | crt.sh |
www.aini1314.shop R3 |
2022-11-29 - 2023-02-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/funccode.php
Frame ID: 1F4128700056BC07B8EB9B2A49A1FC2E
Requests: 18 HTTP requests in this frame
Screenshot
Page Title
ETC利用照会サービスPage URL History Show full URLs
-
http://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/
HTTP 301
https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/ Page URL
- https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/funccode.php Page URL
Detected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/
HTTP 301
https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/ Page URL
- https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/funccode.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/ HTTP 301
- https://www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/ Redirect Chain
|
1 KB 811 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/js/ |
17 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
www.aini1314.shop/api/ |
5 B 356 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
funccode.php
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/ |
1 KB 928 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.a3d93e22.js
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/js/ |
562 KB 191 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.13c407dc.js
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/js/ |
132 KB 39 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.93a25f93.css
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/css/ |
99 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
392 B 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1020 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alert.gif
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/etcris/images/ |
548 B 548 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
77 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
86 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
223 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
904 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
378 B 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ETC (Transportation)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| a1_0x5c523a function| a1_0x382e function| a1_0x3a38 object| webpackChunketc function| a0_0x247f function| a0_0x4e63 function| clearImmediate function| setImmediate1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net/ | Name: isuser Value: true |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.aini1314.shop
www2.etc-meisai.jpetcrfunccode1013000000.xiguazi.net
104.223.4.203
34.150.46.113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