lokl.market
Open in
urlscan Pro
162.214.66.36
Malicious Activity!
Public Scan
Submission: On July 28 via api from JP — Scanned from JP
Summary
This is the only time lokl.market was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 162.214.66.36 162.214.66.36 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
11 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: conceptrecall.com
lokl.market |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
lokl.market
lokl.market |
1 MB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | lokl.market |
lokl.market
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://lokl.market/r/Chase.verify/
Frame ID: CE33D1A65EB2E68109C1D4D5115D3AC7
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
lokl.market/r/Chase.verify/ |
22 KB 22 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
lokl.market/r/A/css/Login/ |
7 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
blue-ui.css
lokl.market/r/A/css/Login/ |
593 KB 593 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logon.css
lokl.market/r/A/css/Login/ |
109 KB 109 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cleave.js
lokl.market/r/A/js/ |
91 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.js
lokl.market/r/A/js/ |
5 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wordmark-white.svg
lokl.market/r/A/img/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background.desktop.day.1.jpeg
lokl.market/r/A/img/ |
299 KB 299 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
regular.woff
lokl.market/r/A/fonts/OpenSans/ |
24 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
semibold.woff
lokl.market/r/A/fonts/OpenSans/ |
25 KB 25 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dcefont.woff
lokl.market/r/A/fonts/other/ |
51 KB 52 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| Cleave function| clicked function| unclicked object| body object| fixed object| username object| password object| remember object| token object| tokenHide object| tokenInput object| submitBtn1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
lokl.market/ | Name: PHPSESSID Value: 309f29d662c963ef913159ded727c1c2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
lokl.market
162.214.66.36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