jittercoms.gm
Open in
urlscan Pro
212.60.66.6
Malicious Activity!
Public Scan
Submission: On March 31 via automatic, source phishtank
Summary
This is the only time jittercoms.gm was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) Wells Fargo (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
14 | 212.60.66.6 212.60.66.6 | 25250 (GAMTEL-AS) (GAMTEL-AS) | |
1 | 54.148.84.95 54.148.84.95 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
1 2 | 192.186.220.3 192.186.220.3 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
16 | 3 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-54-148-84-95.us-west-2.compute.amazonaws.com
www.sitepoint.com |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-192-186-220-3.ip.secureserver.net
csscheckbox.com | |
www.csscheckbox.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
jittercoms.gm
jittercoms.gm |
552 KB |
2 |
csscheckbox.com
1 redirects
csscheckbox.com www.csscheckbox.com |
982 B |
1 |
sitepoint.com
www.sitepoint.com |
6 KB |
16 | 3 |
Domain | Requested by | |
---|---|---|
14 | jittercoms.gm |
jittercoms.gm
|
1 | www.csscheckbox.com |
jittercoms.gm
|
1 | csscheckbox.com | 1 redirects |
1 | www.sitepoint.com |
jittercoms.gm
|
16 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://jittercoms.gm/update/login.php?cmd=login_submit&id=228e1188c9fbe8e38ae70561a85c48ee228e1188c9fbe8e38ae70561a85c48ee&session=228e1188c9fbe8e38ae70561a85c48ee228e1188c9fbe8e38ae70561a85c48ee
Frame ID: 5077A5D86369B60369999E3D92CBA9CD
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 14- http://csscheckbox.com/checkboxes/u/csscheckbox_59786bddc23cad2c757a3a1253557d6a.png HTTP 301
- http://www.csscheckbox.com/checkboxes/u/csscheckbox_59786bddc23cad2c757a3a1253557d6a.png
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
jittercoms.gm/update/ |
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
MaskedPassword.js
www.sitepoint.com/examples/password/MaskedPassword/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s1.png
jittercoms.gm/update/images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s2.png
jittercoms.gm/update/images/ |
117 KB 118 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s3.png
jittercoms.gm/update/images/ |
46 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s4.png
jittercoms.gm/update/images/ |
51 KB 51 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s5.png
jittercoms.gm/update/images/ |
87 KB 88 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s6.png
jittercoms.gm/update/images/ |
91 KB 91 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s7.png
jittercoms.gm/update/images/ |
104 KB 104 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s9.png
jittercoms.gm/update/images/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s10.png
jittercoms.gm/update/images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s8.png
jittercoms.gm/update/images/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s11.png
jittercoms.gm/update/images/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s12.png
jittercoms.gm/update/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ssign.png
jittercoms.gm/update/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
csscheckbox_59786bddc23cad2c757a3a1253557d6a.png
www.csscheckbox.com/checkboxes/u/ Redirect Chain
|
414 B 682 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) Wells Fargo (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| MaskedPassword function| unhideBody0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
csscheckbox.com
jittercoms.gm
www.csscheckbox.com
www.sitepoint.com
192.186.220.3
212.60.66.6
54.148.84.95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