eki-net-jp17.top
Open in
urlscan Pro
194.124.216.11
Malicious Activity!
Public Scan
Effective URL: https://eki-net-jp17.top/login.php
Submission Tags: phishing jr east Search All
Submission: On March 18 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on March 18th 2023. Valid for: 3 months.
This is the only time eki-net-jp17.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: JR East (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 45.117.101.242 45.117.101.242 | 4785 (XTOM-AS-J...) (XTOM-AS-JP xTom) | |
1 | 104.21.29.25 104.21.29.25 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 22 | 194.124.216.11 194.124.216.11 | 3214 (XTOM xTom...) (XTOM xTom GmbH) | |
1 | 221.194.141.169 221.194.141.169 | () () | |
25 | 4 |
ASN4785 (XTOM-AS-JP xTom, JP)
PTR: 45.117.101.242.static.xtom.com
jpcom.cc |
ASN3214 (XTOM xTom GmbH, DE)
PTR: 194.124.216.11.static.xtom.com
eki-net-jp17.top |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
eki-net-jp17.top
2 redirects
eki-net-jp17.top |
226 KB |
1 |
bootcdn.net
cdn.bootcdn.net |
4 KB |
1 |
workers.dev
black-wildflower-1903.yppbavj.workers.dev |
531 B |
1 |
jpcom.cc
1 redirects
jpcom.cc |
228 B |
25 | 4 |
Domain | Requested by | |
---|---|---|
22 | eki-net-jp17.top |
2 redirects
black-wildflower-1903.yppbavj.workers.dev
eki-net-jp17.top |
1 | cdn.bootcdn.net |
eki-net-jp17.top
|
1 | black-wildflower-1903.yppbavj.workers.dev | |
1 | jpcom.cc | 1 redirects |
25 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.yppbavj.workers.dev GTS CA 1P5 |
2023-03-11 - 2023-06-09 |
3 months | crt.sh |
eki-net-jp18.top R3 |
2023-03-18 - 2023-06-16 |
3 months | crt.sh |
cdn.bootcdn.net TrustAsia RSA DV TLS CA G2 |
2022-06-06 - 2023-06-06 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://eki-net-jp17.top/login.php
Frame ID: C376A5B06DF93C0CF3FA81CAAD58C3E1
Requests: 24 HTTP requests in this frame
Frame:
https://eki-net-jp17.top/index_1.html
Frame ID: C81C09C23C19C9CCA5FAA811C88F6509
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://jpcom.cc/6QSm
HTTP 302
https://black-wildflower-1903.yppbavj.workers.dev/ Page URL
- https://eki-net-jp17.top/ Page URL
-
https://eki-net-jp17.top/index.php?t=d3c875a94bff49535037789299a173d8282b39d595398bd087b4ef4078f15b63
HTTP 302
https://eki-net-jp17.top/tiaozhuan.php HTTP 302
https://eki-net-jp17.top/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Akamai Bot Manager (Security) Expand
Detected patterns
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://jpcom.cc/6QSm
HTTP 302
https://black-wildflower-1903.yppbavj.workers.dev/ Page URL
- https://eki-net-jp17.top/ Page URL
-
https://eki-net-jp17.top/index.php?t=d3c875a94bff49535037789299a173d8282b39d595398bd087b4ef4078f15b63
HTTP 302
https://eki-net-jp17.top/tiaozhuan.php HTTP 302
https://eki-net-jp17.top/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://jpcom.cc/6QSm HTTP 302
- https://black-wildflower-1903.yppbavj.workers.dev/
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
black-wildflower-1903.yppbavj.workers.dev/ Redirect Chain
|
65 B 531 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
eki-net-jp17.top/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.23238u92u82.js
eki-net-jp17.top/vendor/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
eki-net-jp17.top/ Redirect Chain
|
23 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.css
eki-net-jp17.top/Personal/member/Login/ |
120 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
module.css
eki-net-jp17.top/Personal/member/Login/ |
74 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
member.css
eki-net-jp17.top/Personal/member/Login/ |
20 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
eki-net-jp17.top/Personal/member/Login/ |
39 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
top_searchparts.css
eki-net-jp17.top/Personal/member/Login/ |
119 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
eki-net-jp17.top/admin/im/ |
91 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
eki-net-jp17.top/admin/im/ |
284 KB 105 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
13 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
load_font.css
eki-net-jp17.top/Personal/member/Login/ |
768 B 971 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_ekinet.png
eki-net-jp17.top/Personal/member/Login/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_jreast.png
eki-net-jp17.top/Personal/member/Login/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_input_ok.png
eki-net-jp17.top/Personal/member/Login/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_linkblank.png
eki-net-jp17.top/Personal/member/Login/ |
166 B 371 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_linkblank-1.png
eki-net-jp17.top/Personal/member/Login/ |
166 B 371 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
eki-net-jp17.top/admin/im/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
eki-net-jp17.top/admin/im/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
eki-net-jp17.top/admin/im/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.php
eki-net-jp17.top/ |
13 B 245 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
NotoSansCJKjp-Regular_subset.woff
eki-net-jp17.top/Personal/member/Login/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
NotoSansCJKjp-Bold_subset.woff
eki-net-jp17.top/Personal/member/Login/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
index_1.html
eki-net-jp17.top/ Frame C81C |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- eki-net-jp17.top
- URL
- https://eki-net-jp17.top/Personal/member/Login/NotoSansCJKjp-Regular_subset.woff
- Domain
- eki-net-jp17.top
- URL
- https://eki-net-jp17.top/Personal/member/Login/NotoSansCJKjp-Bold_subset.woff
- Domain
- eki-net-jp17.top
- URL
- https://eki-net-jp17.top/index_1.html
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: JR East (Transportation)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
eki-net-jp17.top/ | Name: PHPSESSID Value: kdtsj9ig84ndqh5te354m17snl |
|
.eki-net-jp17.top/ | Name: 62345ba76168db0033ce8ae6a90ce5a762956614 Value: nwcMGFHjQc7nDOZDxhWlbg%3D%3D |
|
.eki-net-jp17.top/ | Name: _amkc Value: 98e20b58-d55e-4bcd-973e-cf85434791bd |
|
.eki-net-jp17.top/ | Name: ak_bmsc Value: 28b%2F1jhT5rYk%2BozAxmMy5pbag5QGKCY3o0W876AAk5nualh%2FgmjcSBx8TAWBybrdKQTrAU3bQQan2pU71PPsdR9wzJMdXXygEzRthO%2F2KNS8RqYSi2nWknnFPHa7E7HoXdseeggbTsAIEhqo5HaacUCRw9WzM0elVMyg2QJNlY2r3cBU%2BPsMaQm4liV5LWJRe4azyqfynjdVNF9KI9gXa7EE%2Fy3OigtC3LBdSPUFzBsrxJrPL8aLqGgwxNPGe%2FAJ5Hhoqyvuwa5F2tjK%2B0A6Ix1HNwEUH3IQppBZqPgydCfSqqWWP6pLwytK2lzza%2B%2BtJen3Jod20HJUtf1HNVyCiaTAaHKFLzR9AcMdWIff8GM0bbF7pdWB3dLu4VqhiMpuRNu%2BQodx96d0G0MooLOX9QQSCgHTqPcdU%2B76NFguH9QDoF0yrCOIvCcx5rcEdr%2FbhSDrkur4kweVkvNRCa6UWEmgLr3gS7dhDjGNaCao%2BUQkrJg0LDdscHOs%2FiuktIh5ijzyI4qDQIdwdnxDFTb3vcR6%2BGLxFE%2FWEMujKuxOsGsG%2FuqYGj202aKWYz5J%2Fudjbpltt83vHB8vg1LVn%2BFDZvNwZ1u4ypS%2Boo%2FA7UP%2BTy1L3bRnn8S4cuFAdFG5VPBC15h%2BmlF6f8INt4rODUXBSuljoSdNZwjtr5vKBc%2FLSO0bRm%2FnvgzBDETc5k8ifD0GKxCNHsCyj6R49ADLpxWz9pMIhpAsUQEtRdASYk0BTUI%3D |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
black-wildflower-1903.yppbavj.workers.dev
cdn.bootcdn.net
eki-net-jp17.top
jpcom.cc
eki-net-jp17.top
104.21.29.25
194.124.216.11
221.194.141.169
45.117.101.242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