www.jexhelp.com
Open in
urlscan Pro
20.205.108.173
Malicious Activity!
Public Scan
Effective URL: https://www.jexhelp.com/
Submission: On July 18 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on July 3rd 2022. Valid for: 3 months.
This is the only time www.jexhelp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Coinbase (Crypto Exchange)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 18 | 20.205.108.173 20.205.108.173 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
17 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
jexhelp.com
1 redirects
www.jexhelp.com |
6 MB |
17 | 1 |
Domain | Requested by | |
---|---|---|
18 | www.jexhelp.com |
1 redirects
www.jexhelp.com
|
17 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.jexhelp.com ZeroSSL RSA Domain Secure Site CA |
2022-07-03 - 2022-10-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.jexhelp.com/
Frame ID: 6B7C21EBA667B3DCD7544535E4B46D1C
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
JEXPage URL History Show full URLs
-
http://www.jexhelp.com/
HTTP 308
https://www.jexhelp.com/ Page URL
Detected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.jexhelp.com/
HTTP 308
https://www.jexhelp.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.jexhelp.com/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.2841ac3f.css
www.jexhelp.com/static/css/ |
97 KB 98 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.bb1cb498.css
www.jexhelp.com/static/css/ |
254 KB 254 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.07fbdfc4.js
www.jexhelp.com/static/js/ |
4 MB 5 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.2a05b3d1.js
www.jexhelp.com/static/js/ |
325 KB 326 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
identify
www.jexhelp.com/api/ |
179 B 772 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0
www.jexhelp.com/api/wallets/1/templates/ |
315 B 908 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
configs
www.jexhelp.com/api/ |
2 KB 3 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rekk0p2.json
www.jexhelp.com/files/ |
148 KB 149 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rcw45g3.29795107
www.jexhelp.com/files/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_duigou.455309c2.svg
www.jexhelp.com/static/img/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rcw1dg6.44
www.jexhelp.com/files/ |
53 KB 53 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_googlePlay.ca316662.png
www.jexhelp.com/static/img/ |
18 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_appStore.041db9cd.png
www.jexhelp.com/static/img/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dialogs
www.jexhelp.com/api/app/ |
44 B 636 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Nunito-Bold.c0844c99.ttf
www.jexhelp.com/static/fonts/ |
149 KB 150 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Nunito-SemiBold.876701bc.ttf
www.jexhelp.com/static/fonts/ |
150 KB 150 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Coinbase (Crypto Exchange)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation object| webpackJsonp object| regeneratorRuntime object| web3 object| contract object| lib number| rem number| dpr function| filterCSS function| filterXSS object| configObj0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.jexhelp.com
20.205.108.173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