www.91kaka.cn
Open in
urlscan Pro
49.233.35.21
Malicious Activity!
Public Scan
Effective URL: https://www.91kaka.cn/intern/aboutus.php
Submission: On August 19 via automatic, source openphish
Summary
TLS certificate: Issued by TrustAsia TLS RSA CA on September 8th 2020. Valid for: a year.
This is the only time www.91kaka.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: UK Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 49.233.35.21 49.233.35.21 | 45090 (CNNIC-TEN...) (CNNIC-TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited) | |
7 | 1 |
ASN45090 (CNNIC-TENCENT-NET-AP Shenzhen Tencent Computer Systems Company Limited, CN)
www.91kaka.cn |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
91kaka.cn
1 redirects
www.91kaka.cn |
90 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
8 | www.91kaka.cn |
1 redirects
www.91kaka.cn
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
91kaka.cn TrustAsia TLS RSA CA |
2020-09-08 - 2021-09-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.91kaka.cn/intern/aboutus.php
Frame ID: 0627DB113183FDD36B83942D16A47FA2
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.91kaka.cn/intern/aboutus.php
HTTP 301
https://www.91kaka.cn/intern/aboutus.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.91kaka.cn/intern/aboutus.php
HTTP 301
https://www.91kaka.cn/intern/aboutus.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
aboutus.php
www.91kaka.cn/intern/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.91kaka.cn/intern/css/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jqueryLib.js
www.91kaka.cn/intern/js/ |
85 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
actions.js
www.91kaka.cn/intern/js/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img1.png
www.91kaka.cn/intern/images/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img3.png
www.91kaka.cn/intern/images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footer.png
www.91kaka.cn/intern/images/ |
37 KB 37 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: UK Government (Government)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| numbersOnly function| digitsOnly function| allowedChars function| isOneOf object| input0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.91kaka.cn
49.233.35.21
00d54b962885d148c7c4c146110c17b1967fac317d43eb66e3d5cc9c2745309a
34b53621f50bda83302e248619666fcc73ec42c17b90b1b5066478c30dea257e
47f64f78db1e616f772ff22370549d440409c5725b5fc770a49119f8f6e60bc8
57b88fae9e3d803086b5b66cf680693620de415b5f0134a91352e53a34586da8
75b707d8761e2bfbd25fbd661f290a4f7fd11c48e1bf53a36dc6bd8a0034fa35
bce08cc241535933cea32e6ad07a17e78cd1977e1ff81acc8441e6c07b5607f1
f6620d16b188685ee0e3b3d43ec8b207a4f8ad643d276a36bacd523e7409cac5