woadjpf.youdontcare.com
Open in
urlscan Pro
45.61.185.38
Malicious Activity!
Public Scan
Effective URL: https://woadjpf.youdontcare.com/login.php?.75dc96d4c674a875768a725c0af67154._login_auth=%2F%27.2022-11-18%2014:37:10
Submission: On November 18 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on November 18th 2022. Valid for: 3 months.
This is the only time woadjpf.youdontcare.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: JR East (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 16 | 45.61.185.38 45.61.185.38 | 53667 (PONYNET) (PONYNET) | |
15 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
youdontcare.com
1 redirects
woadjpf.youdontcare.com |
65 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
16 | woadjpf.youdontcare.com |
1 redirects
woadjpf.youdontcare.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
niandou.zzux.com R3 |
2022-11-18 - 2023-02-16 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://woadjpf.youdontcare.com/login.php?.75dc96d4c674a875768a725c0af67154._login_auth=%2F%27.2022-11-18%2014:37:10
Frame ID: 471999BA6C867758550CA5FAA5CDA165
Requests: 14 HTTP requests in this frame
Frame:
https://woadjpf.youdontcare.com/images/index_1.html
Frame ID: 111D6D4D3617B2F7DEDBF19026B05906
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
えきねっと(JR東日本)|ログインPage URL History Show full URLs
-
https://woadjpf.youdontcare.com/
HTTP 302
https://woadjpf.youdontcare.com/login.php?.75dc96d4c674a875768a725c0af67154._login_auth=%2F%27.2022-11-18%20... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://woadjpf.youdontcare.com/
HTTP 302
https://woadjpf.youdontcare.com/login.php?.75dc96d4c674a875768a725c0af67154._login_auth=%2F%27.2022-11-18%2014:37:10 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
woadjpf.youdontcare.com/ Redirect Chain
|
21 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.css
woadjpf.youdontcare.com/css/ |
120 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
module.css
woadjpf.youdontcare.com/css/ |
74 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
member.css
woadjpf.youdontcare.com/css/ |
20 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
woadjpf.youdontcare.com/css/ |
39 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
top_searchparts.css
woadjpf.youdontcare.com/css/ |
119 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
load_font.css
woadjpf.youdontcare.com/css/ |
786 B 377 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_ekinet.png
woadjpf.youdontcare.com/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_jreast.png
woadjpf.youdontcare.com/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_input_ok.png
woadjpf.youdontcare.com/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_linkblank.png
woadjpf.youdontcare.com/images/ |
166 B 213 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_linkblank-1.png
woadjpf.youdontcare.com/images/ |
166 B 213 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_1.html
woadjpf.youdontcare.com/images/ Frame 111D |
270 B 319 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notosanscjkjp-regular_subset.woff
woadjpf.youdontcare.com/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notosanscjkjp-bold_subset.woff
woadjpf.youdontcare.com/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: JR East (Transportation)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
woadjpf.youdontcare.com/ | Name: PHPSESSID Value: b4q4g39augoi1dmkg55trtkos5 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
woadjpf.youdontcare.com
45.61.185.38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