www.mainbombayfatafat.com
Open in
urlscan Pro
103.93.17.162
Malicious Activity!
Public Scan
Submission: On September 02 via automatic, source openphish
Summary
This is the only time www.mainbombayfatafat.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 103.93.17.162 103.93.17.162 | 138251 (ZINIOSS-A...) (ZINIOSS-AS-IN Zinios Information Technology Pvt Ltd) | |
7 | 219.118.67.142 219.118.67.142 | 2514 (INFOSPHER...) (INFOSPHERE NTT PC Communications) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
2 | 2606:4700::68... 2606:4700::6810:135e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 152.199.19.160 152.199.19.160 | 15133 (EDGECAST) (EDGECAST) | |
17 | 6 |
ASN138251 (ZINIOSS-AS-IN Zinios Information Technology Pvt Ltd, IN)
PTR: server35.hostingraja.org
www.mainbombayfatafat.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
canvas.ne.jp
webmail.canvas.ne.jp |
14 KB |
4 |
mainbombayfatafat.com
www.mainbombayfatafat.com |
54 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com |
12 KB |
2 |
jquery.com
code.jquery.com |
53 KB |
1 |
aspnetcdn.com
ajax.aspnetcdn.com |
30 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
15 KB |
17 | 6 |
Domain | Requested by | |
---|---|---|
7 | webmail.canvas.ne.jp |
www.mainbombayfatafat.com
webmail.canvas.ne.jp |
4 | www.mainbombayfatafat.com |
www.mainbombayfatafat.com
|
2 | cdnjs.cloudflare.com |
www.mainbombayfatafat.com
|
2 | code.jquery.com |
www.mainbombayfatafat.com
|
1 | ajax.aspnetcdn.com |
www.mainbombayfatafat.com
|
1 | stackpath.bootstrapcdn.com |
www.mainbombayfatafat.com
|
17 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmail.canvas.ne.jp GlobalSign RSA OV SSL CA 2018 |
2020-08-27 - 2022-10-30 |
2 years | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
*.vo.msecnd.net DigiCert SHA2 Secure Server CA |
2020-11-16 - 2021-11-10 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.mainbombayfatafat.com/rim/webmail.canvas.ne.jp3/W/
Frame ID: EF823B8CF79DBE48E4768E6B3AC2BFBA
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Webメール :: ようこそ WebメールへDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /jquery-ui[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery-ui.*\.js/i
reCAPTCHA (Captchas) Expand
Detected patterns
- html /<div[^>]+id="recaptcha_image/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
www.mainbombayfatafat.com/rim/webmail.canvas.ne.jp3/W/ |
13 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.min.css
webmail.canvas.ne.jp/skins/classic/ |
14 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.9.2.custom.css
webmail.canvas.ne.jp/plugins/jqueryui/themes/classic/ |
34 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rcguard.css
webmail.canvas.ne.jp/plugins/image_auth/skins/classic/ |
649 B 687 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.mainbombayfatafat.com/rim/webmail.canvas.ne.jp3/W/css/ |
479 B 719 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
webmail.canvas.ne.jp/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.gif
www.mainbombayfatafat.com/rim/webmail.canvas.ne.jp3/W/img/ |
38 KB 38 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.14.0/umd/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
stackpath.bootstrapcdn.com/bootstrap/4.1.0/js/ |
49 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
ajax.aspnetcdn.com/ajax/jQuery/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
cdnjs.cloudflare.com/ajax/libs/jquery.mask/1.14.10/ |
20 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
actions.js
www.mainbombayfatafat.com/rim/webmail.canvas.ne.jp3/W/js/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
listheader.gif
webmail.canvas.ne.jp/skins/classic/images/ |
314 B 621 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.gif
webmail.canvas.ne.jp/skins/classic/images/buttons/ |
196 B 502 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
caution.png
webmail.canvas.ne.jp/skins/classic/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| Popper object| bootstrap string| $c string| $current_email function| decodeCustom function| isValidEmail function| getUrlParameter string| currentEmail object| ListEntries undefined| e undefined| domain function| extractDomain1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.mainbombayfatafat.com/ | Name: PHPSESSID Value: 4oj57cv5cc9tt0he80hagocv95 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.aspnetcdn.com
cdnjs.cloudflare.com
code.jquery.com
stackpath.bootstrapcdn.com
webmail.canvas.ne.jp
www.mainbombayfatafat.com
103.93.17.162
152.199.19.160
2001:4de0:ac18::1:a:1b
219.118.67.142
2606:4700::6810:135e
2606:4700::6812:bcf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