www.japanpast.huishoukc.com
Open in
urlscan Pro
87.121.112.42
Malicious Activity!
Public Scan
Effective URL: https://www.japanpast.huishoukc.com/client/index_pc.php
Submission Tags: phishing jp-bank jp financial Search All
Submission: On February 07 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 6th 2024. Valid for: 3 months.
This is the only time www.japanpast.huishoukc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Japan Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a02:6b8::221 2a02:6b8::221 | 13238 (YANDEX) (YANDEX) | |
1 1 | 2a02:6b8::232 2a02:6b8::232 | 13238 (YANDEX) (YANDEX) | |
1 6 | 87.121.112.42 87.121.112.42 | 34224 (NETERRA-AS) (NETERRA-AS) | |
15 | 23.62.20.69 23.62.20.69 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 54.95.155.134 54.95.155.134 | 16509 (AMAZON-02) (AMAZON-02) | |
21 | 3 |
ASN34224 (NETERRA-AS, BG)
PTR: 87-121-112-42.cloudware.bg
www.japanpast.huishoukc.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-62-20-69.deploy.static.akamaitechnologies.com
cache.jp-bank.japanpost.jp |
ASN16509 (AMAZON-02, US)
PTR: ec2-54-95-155-134.ap-northeast-1.compute.amazonaws.com
directcss.jp-bank.japanpost.jp |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
japanpost.jp
cache.jp-bank.japanpost.jp directcss.jp-bank.japanpost.jp |
114 KB |
6 |
huishoukc.com
1 redirects
www.japanpast.huishoukc.com |
208 KB |
1 |
yandex.ru
1 redirects
sba.yandex.ru — Cisco Umbrella Rank: 390112 |
302 B |
1 |
clck.ru
1 redirects
clck.ru — Cisco Umbrella Rank: 319416 |
846 B |
21 | 4 |
Domain | Requested by | |
---|---|---|
15 | cache.jp-bank.japanpost.jp |
www.japanpast.huishoukc.com
cache.jp-bank.japanpost.jp |
6 | www.japanpast.huishoukc.com |
1 redirects
www.japanpast.huishoukc.com
|
1 | directcss.jp-bank.japanpost.jp |
www.japanpast.huishoukc.com
|
1 | sba.yandex.ru | 1 redirects |
1 | clck.ru | 1 redirects |
21 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.japanpast.huishoukc.com R3 |
2024-02-06 - 2024-05-06 |
3 months | crt.sh |
direct.jp-bank.japanpost.jp DigiCert SHA2 Extended Validation Server CA |
2023-08-10 - 2024-08-08 |
a year | crt.sh |
directacct.jp-bank.japanpost.jp DigiCert EV RSA CA G2 |
2023-03-29 - 2024-04-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.japanpast.huishoukc.com/client/index_pc.php
Frame ID: E3D8EC4D7CA1755422E67A94E2C4F994
Requests: 21 HTTP requests in this frame
Screenshot
Page Title
ゆうちょダイレクト | ログインPage URL History Show full URLs
-
https://clck.ru/38b2oy
HTTP 302
https://sba.yandex.ru/redirect?url=https%3A%2F%2Fwww.japanpast.huishoukc.com%3Findex%3D27&client=c... HTTP 302
https://www.japanpast.huishoukc.com/?index=27 HTTP 302
https://www.japanpast.huishoukc.com/client/ispc.php Page URL
- https://www.japanpast.huishoukc.com/client/index_pc.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- (?:/([\d.]+))?/vue(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://clck.ru/38b2oy
HTTP 302
https://sba.yandex.ru/redirect?url=https%3A%2F%2Fwww.japanpast.huishoukc.com%3Findex%3D27&client=clck&request_id=1707294435108915-1043609936238100539&sign=3a30d9a91937e2d91179bfb054ac8017 HTTP 302
https://www.japanpast.huishoukc.com/?index=27 HTTP 302
https://www.japanpast.huishoukc.com/client/ispc.php Page URL
- https://www.japanpast.huishoukc.com/client/index_pc.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://clck.ru/38b2oy HTTP 302
- https://sba.yandex.ru/redirect?url=https%3A%2F%2Fwww.japanpast.huishoukc.com%3Findex%3D27&client=clck&request_id=1707294435108915-1043609936238100539&sign=3a30d9a91937e2d91179bfb054ac8017 HTTP 302
- https://www.japanpast.huishoukc.com/?index=27 HTTP 302
- https://www.japanpast.huishoukc.com/client/ispc.php
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
ispc.php
www.japanpast.huishoukc.com/client/ Redirect Chain
|
964 B 663 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
index_pc.php
www.japanpast.huishoukc.com/client/ |
17 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dgCAbase.css
cache.jp-bank.japanpost.jp/pages/pc/etc/css/ |
123 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAheaderLogo01.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/structure/ |
3 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAheaderLogo02.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/structure/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconBlank01.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phishingmail.png
cache.jp-bank.japanpost.jp/pages/cmsimage/4/files/Image/ |
49 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btn_menu_direct.gif
cache.jp-bank.japanpost.jp/pages/cmsimage/4/files/Image/ |
12 KB 12 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
FAQlink.png
cache.jp-bank.japanpost.jp/pages/cmsimage/4/files/Image/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAimgTel01.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAfooterLogo01.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/structure/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chrome.png
directcss.jp-bank.japanpost.jp/js/ |
3 B 275 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vue.js
www.japanpast.huishoukc.com/js/ |
334 KB 104 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.js
www.japanpast.huishoukc.com/js/ |
281 KB 97 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_pc.js
www.japanpast.huishoukc.com/js/ |
826 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconArrow07.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconArrow02.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconArrow04.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconArrow04L.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconBullet01.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
DFCAiconArrow03T.gif
cache.jp-bank.japanpost.jp/pages/pc/etc/img/modules/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Japan Post (Transportation)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Vue function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.clck.ru/ | Name: _yasc Value: fkZl0EuFZ/W1BT7Jvn9gP2EtWbZcPpu5OAVzu0Tsk2oxhrAqHLFcOvMbhoV5wafufQ== |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cache.jp-bank.japanpost.jp
clck.ru
directcss.jp-bank.japanpost.jp
sba.yandex.ru
www.japanpast.huishoukc.com
23.62.20.69
2a02:6b8::221
2a02:6b8::232
54.95.155.134
87.121.112.42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