jeuxsvideo.com
Open in
urlscan Pro
43.135.10.199
Malicious Activity!
Public Scan
Effective URL: https://jeuxsvideo.com/
Submission Tags: phishing amazon Search All
Submission: On August 18 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on August 9th 2023. Valid for: 3 months.
This is the only time jeuxsvideo.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 172.67.140.105 172.67.140.105 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 43.135.10.199 43.135.10.199 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
9 | 3 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
jeuxsvideo.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
jeuxsvideo.com
jeuxsvideo.com |
122 KB |
5 |
stafftechjobs.com
1 redirects
bowxku.stafftechjobs.com |
8 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
5 | jeuxsvideo.com |
bowxku.stafftechjobs.com
jeuxsvideo.com |
5 | bowxku.stafftechjobs.com |
1 redirects
bowxku.stafftechjobs.com
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
stafftechjobs.com GTS CA 1P5 |
2023-08-16 - 2023-11-14 |
3 months | crt.sh |
dexianglou.com R3 |
2023-08-09 - 2023-11-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jeuxsvideo.com/
Frame ID: 6AE47681C6DE5315509DA9EFEFB218C8
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Amazon | 本, ファッション, 家電から食品まで | アマゾンPage URL History Show full URLs
- https://bowxku.stafftechjobs.com/caonige4v85ul Page URL
-
https://bowxku.stafftechjobs.com/cdn-cgi/phish-bypass?atok=Ei1ToWos.MI_kXlhx_Rwlc79_yBdVLhQOubBcBL_ZYo-169233...
HTTP 301
https://bowxku.stafftechjobs.com/caonige4v85ul Page URL
- https://jeuxsvideo.com/ Page URL
Detected technologies
Vuetify (UI frameworks) ExpandDetected patterns
- <div data-app[^>]+class="v-application
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://bowxku.stafftechjobs.com/caonige4v85ul Page URL
-
https://bowxku.stafftechjobs.com/cdn-cgi/phish-bypass?atok=Ei1ToWos.MI_kXlhx_Rwlc79_yBdVLhQOubBcBL_ZYo-1692335441-0-%2Fcaonige4v85ul
HTTP 301
https://bowxku.stafftechjobs.com/caonige4v85ul Page URL
- https://jeuxsvideo.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://bowxku.stafftechjobs.com/cdn-cgi/phish-bypass?atok=Ei1ToWos.MI_kXlhx_Rwlc79_yBdVLhQOubBcBL_ZYo-1692335441-0-%2Fcaonige4v85ul HTTP 301
- https://bowxku.stafftechjobs.com/caonige4v85ul
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
caonige4v85ul
bowxku.stafftechjobs.com/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
bowxku.stafftechjobs.com/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
bowxku.stafftechjobs.com/cdn-cgi/images/ |
452 B 542 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
caonige4v85ul
bowxku.stafftechjobs.com/ Redirect Chain
|
62 B 357 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
jeuxsvideo.com/ |
27 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
jeuxsvideo.com/static/japyamaxun/1/ |
12 KB 12 KB |
Stylesheet
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
materialdesignicons.min.css
jeuxsvideo.com/static/japyamaxun/1/ |
326 KB 64 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.880b302c.css
jeuxsvideo.com/static/japyamaxun/1/ |
284 KB 38 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.b48e5d48.css
jeuxsvideo.com/static/japyamaxun/1/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bowxku.stafftechjobs.com/ | Name: __cf_mw_byp Value: Ei1ToWos.MI_kXlhx_Rwlc79_yBdVLhQOubBcBL_ZYo-1692335441-0-/caonige4v85ul |
|
jeuxsvideo.com/ | Name: think_lang Value: jp-jp |
|
jeuxsvideo.com/ | Name: PHPSESSID Value: e8f43ee20774079d16a896f9a7c62f7d |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bowxku.stafftechjobs.com
jeuxsvideo.com
172.67.140.105
43.135.10.199
10fe986d0c623ee3e1af02ec31a8f21fe90a99cefe9751e162acc7c14ba32ef3
1103290e25ebda2712abe344a87facbac00ddaba712729be9fe5feef807bf91b
446611327adb01390eb1937a404e9bf6ce05541af688a5c609cedc9abf39e72d
59a65b73431f20271cfd3d29a24ce135ac1ba4779849781256df1edff858a36f
91bf1028a832fff433bb9a68c6e440dee57e3ebbe8da798c8d8b7d5ee0e9fa38
b345abe33a4f53c748b8b6858bbe2c0380add9fbbec748044d2e76d6f0bd681d
ba4172432768f0d219c30a24b12526827217d34efd45dad4132ac7dff4cc4c7f
d4f1e73a09409d5c397270dd8d9fe2bf07ad3cec80b30fbba30164da2152c252
f1591a5221136c49438642155691ae6c68e25b7241f3d7ebe975b09a77662016