www.post-post.jp
Open in
urlscan Pro
183.90.228.35
Malicious Activity!
Public Scan
Submission: On April 23 via automatic, source openphish
Summary
This is the only time www.post-post.jp was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 16 | 183.90.228.35 183.90.228.35 | 9371 (SAKURA-C ...) (SAKURA-C SAKURA Internet Inc.) | |
2 | 2.18.233.20 2.18.233.20 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 2 | 172.82.228.16 172.82.228.16 | 15224 (OMNITURE) (OMNITURE - Adobe Systems Inc.) | |
18 | 3 |
ASN9371 (SAKURA-C SAKURA Internet Inc., JP)
PTR: sv1134.xserver.jp
www.post-post.jp | |
post-post.jp |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
www.paypalobjects.com |
ASN15224 (OMNITURE - Adobe Systems Inc., US)
PTR: *.d1.sc.omtrdc.net
paypal.d1.sc.omtrdc.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
post-post.jp
1 redirects
www.post-post.jp post-post.jp |
366 KB |
2 |
omtrdc.net
1 redirects
paypal.d1.sc.omtrdc.net |
2 KB |
2 |
paypalobjects.com
www.paypalobjects.com |
1 KB |
18 | 3 |
Domain | Requested by | |
---|---|---|
15 | www.post-post.jp |
1 redirects
www.post-post.jp
|
2 | paypal.d1.sc.omtrdc.net | 1 redirects |
2 | www.paypalobjects.com |
www.post-post.jp
|
1 | post-post.jp |
www.post-post.jp
|
18 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paypal.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.post-post.jp/ad2016/js/dir1/Information.html
Frame ID: D3745E6329653333378CF9CB43B0266
Requests: 18 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
PayPal (Payment Processors) Expand
Detected patterns
- env /^PAYPAL$/i
SiteCatalyst (Analytics) Expand
Detected patterns
- env /^s_(?:account|objectID|code|INST)$/i
YUI (JavaScript Libraries) Expand
Detected patterns
- env /^YAHOO$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 14- http://www.post-post.jp/en_US/i/icon/secure_lock_2.gif HTTP 301
- http://post-post.jp/en_US/i/icon/secure_lock_2.gif
- http://paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/s71419253262769?AQB=1&ndh=1&t=23%2F3%2F2018%2016%3A45%3A10%201%200&fid=575E13F54DB6F194-2BAFE201A52666B2&vmt=51437A79&vmf=paypal.112.2o7.net&ce=UTF-8&ns=paypal&pageName=post-post.jp%2Fad2016%2Fjs%2Fdir1%2Finformation.html&g=http%3A%2F%2Fwww.post-post.jp%2Fad2016%2Fjs%2Fdir1%2FInformation.html&cc=USD&c1=unknown&c7=none&v7=none%3Anone%3Anone&c8=none&c9=none&c17=Confirm%20Credit%20Card%20or%20Debit%20Card%20-%20PayPaI&c19=post-post.jp%2Fad2016%2Fjs%2Fdir1%2Finformation.html&v19=D%3Dc7&v31=post-post.jp%2Fad2016%2Fjs%2Fdir1%2Finformation.html&c36=post-post.jp%2Fad2016%2Fjs%2Fdir1%2FInformation.html&c39=D%3DpageName&c47=D%3DpageName&c50=unknown&c53=h.25.3%7C01.17.2013&c72=UTF-8&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1 HTTP 302
- http://paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/s71419253262769?AQB=1&pccr=true&vidn=2D6F06CB053108C9-400001028009A363&&ndh=1&t=23%2F3%2F2018%2016%3A45%3A10%201%200&fid=575E13F54DB6F194-2BAFE201A52666B2&vmt=51437A79&vmf=paypal.112.2o7.net&ce=UTF-8&ns=paypal&pageName=post-post.jp%2Fad2016%2Fjs%2Fdir1%2Finformation.html&g=http%3A%2F%2Fwww.post-post.jp%2Fad2016%2Fjs%2Fdir1%2FInformation.html&cc=USD&c1=unknown&c7=none&v7=none%3Anone%3Anone&c8=none&c9=none&c17=Confirm%20Credit%20Card%20or%20Debit%20Card%20-%20PayPaI&c19=post-post.jp%2Fad2016%2Fjs%2Fdir1%2Finformation.html&v19=D%3Dc7&v31=post-post.jp%2Fad2016%2Fjs%2Fdir1%2Finformation.html&c36=post-post.jp%2Fad2016%2Fjs%2Fdir1%2FInformation.html&c39=D%3DpageName&c47=D%3DpageName&c50=unknown&c53=h.25.3%7C01.17.2013&c72=UTF-8&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Information.html
www.post-post.jp/ad2016/js/dir1/ |
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
www.post-post.jp/ad2016/js/dir1/ |
56 KB 56 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProfileCCAdd.css
www.post-post.jp/ad2016/js/dir1/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.js
www.post-post.jp/ad2016/js/dir1/ |
60 KB 60 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.gif
www.post-post.jp/ad2016/js/dir1/ |
1 KB 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
print.css
www.post-post.jp/ad2016/js/dir1/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pixel.gif
www.post-post.jp/ad2016/js/dir1/ |
43 B 318 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_cc1.gif
www.post-post.jp/ad2016/js/dir1/ |
347 B 624 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_cc2.gif
www.post-post.jp/ad2016/js/dir1/ |
894 B 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
maestro2.jpg
www.post-post.jp/ad2016/js/dir1/ |
1 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mini.gif
www.post-post.jp/ad2016/js/dir1/ |
509 B 786 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
widgets.js
www.post-post.jp/ad2016/js/dir1/ |
139 KB 140 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProfileCCAdd.js
www.post-post.jp/ad2016/js/dir1/ |
15 KB 16 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pp_jscode_080706.js
www.post-post.jp/ad2016/js/dir1/ |
60 KB 61 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
btn_bg_sprite.gif
www.paypalobjects.com/en_US/i/pui/core/ |
86 B 414 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
secure_lock_2.gif
post-post.jp/en_US/i/icon/ Redirect Chain
|
120 B 120 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
nav_sprite.gif
www.paypalobjects.com/en_US/i/pui/core/ |
755 B 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s71419253262769
paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/ Redirect Chain
|
43 B 661 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)43 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| antiClickjack object| YAHOO object| PAYPAL undefined| Tracker object| YUD object| YUE object| beta_user function| dynamicData undefined| minLgth undefined| autocomplete2 undefined| autocomplete3 undefined| autocomplete4 function| onSearchBoxLoad function| onSearchBoxFocusIn function| onSearchBoxValueChanged function| onSearchBoxBlur function| onSearchBoxDeleteIconClicked function| onSelectSubmit number| cupJsonIndexLength number| jsonResponseLength object| cupCard string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code string| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| scOnload string| j object| s_i_paypal2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.post-post.jp/ | Name: s_sess Value: %20s_ppv%3D100%3B%20s_cc%3Dtrue%3B%20v31%3Dpost-post.jp%252Fad2016%252Fjs%252Fdir1%252Finformation.html%3B%20s_sq%3D%3B |
|
.post-post.jp/ | Name: s_pers Value: %20s_fid%3D575E13F54DB6F194-2BAFE201A52666B2%7C1587660310287%3B%20gpv_c43%3Dpost-post.jp%252Fad2016%252Fjs%252Fdir1%252Finformation.html%7C1524503710289%3B%20tr_p1%3Dpost-post.jp%252Fad2016%252Fjs%252Fdir1%252Finformation.html%7C1524503710290%3B%20gpv_events%3Dno%2520value%7C1524503710291%3B |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paypal.d1.sc.omtrdc.net
post-post.jp
www.paypalobjects.com
www.post-post.jp
172.82.228.16
183.90.228.35
2.18.233.20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