www.hengdiandongci.com
Open in
urlscan Pro
154.91.176.218
Malicious Activity!
Public Scan
Submission Tags: phishing
Submission: On October 01 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R11 on September 30th 2024. Valid for: 3 months.
This is the only time www.hengdiandongci.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: au Jibun Bank (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
24 | 154.91.176.218 154.91.176.218 | 400619 (AROSS-AS) (AROSS-AS) | |
2 | 13.251.181.147 13.251.181.147 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2600:9000:26a... 2600:9000:26a7:e00:10:3572:e540:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 3.164.110.26 3.164.110.26 | 16509 (AMAZON-02) (AMAZON-02) | |
31 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-13-251-181-147.ap-southeast-1.compute.amazonaws.com
seal.digicert.com |
ASN16509 (AMAZON-02, US)
static.fraud-alert.net |
ASN16509 (AMAZON-02, US)
PTR: server-3-164-110-26.nrt12.r.cloudfront.net
p.fraud-alert.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
24 |
hengdiandongci.com
www.hengdiandongci.com |
1 MB |
2 |
fraud-alert.net
static.fraud-alert.net p.fraud-alert.net |
21 KB |
2 |
digicert.com
seal.digicert.com — Cisco Umbrella Rank: 12400 |
8 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
31 | 4 |
Domain | Requested by | |
---|---|---|
24 | www.hengdiandongci.com |
www.hengdiandongci.com
|
2 | seal.digicert.com |
www.hengdiandongci.com
|
1 | p.fraud-alert.net |
static.fraud-alert.net
|
1 | static.fraud-alert.net |
www.hengdiandongci.com
|
0 | localhost Failed |
www.hengdiandongci.com
|
31 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
ib.jibunbank.co.jp |
help.jibunbank.co.jp |
www.jibunbank.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.hengdiandongci.com R11 |
2024-09-30 - 2024-12-29 |
3 months | crt.sh |
seal.digicert.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-02-14 - 2025-01-30 |
a year | crt.sh |
*.fraud-alert.net Amazon RSA 2048 M02 |
2024-09-13 - 2025-10-13 |
a year | crt.sh |
This page contains 1 frames:
Frame:
http://localhost/
Frame ID: 6EB44736085FB6E04FDA73FADA1E2006
Requests: 31 HTTP requests in this frame
Screenshot
Page Title
ログイン | ログイン | auじぶん銀行Detected technologies
Google Tag Manager (Tag Managers) ExpandDetected patterns
- googletagmanager\.com/ns\.html[^>]+></iframe>
- <!-- (?:End )?Google Tag Manager -->
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
7 Outgoing links
These are links going to different origins than the main page.
Title: ログインパスワードを忘れた・ロックしてしまったお客さま
Search URL Search Domain Scan URL
Title: ログインできなくなりました。
Search URL Search Domain Scan URL
Title: ログインパスワードとは何ですか?
Search URL Search Domain Scan URL
Title: お客さま番号とログインパスワードを正しく入力しても、インターネットバンキングにログインできません。
Search URL Search Domain Scan URL
Title: ログインパスワードを忘れてしまいました。どうすればいいですか?
Search URL Search Domain Scan URL
Title: ログインパスワードを何度も間違えて、入力できなくなりました。どうすればいいですか?
Search URL Search Domain Scan URL
Title: 全てを見る
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
31 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.jsp
www.hengdiandongci.com/ |
19 KB 19 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.js
www.hengdiandongci.com/js/ |
256 KB 257 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
www.hengdiandongci.com/js/ |
190 KB 191 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
www.hengdiandongci.com/style/css/ |
516 KB 520 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.js
www.hengdiandongci.com/js/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
extended_timeout.js
www.hengdiandongci.com/js/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.min.js
www.hengdiandongci.com/js/ |
86 KB 86 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img_site-logo_pc.png
www.hengdiandongci.com/style/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img_site-logo_sp.png
www.hengdiandongci.com/style/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
before_auth.css
www.hengdiandongci.com/style/css/ |
447 B 520 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
question.svg
www.hengdiandongci.com/style/img/ |
717 B 801 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
gtm.js
www.hengdiandongci.com/js/ |
195 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
seal.digicert.com/seals/cascade/ |
155 B 560 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
seal.min.js
www.hengdiandongci.com/js/ |
8 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_img04.png
www.hengdiandongci.com/style/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_img05.png
www.hengdiandongci.com/style/img/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_img06.png
www.hengdiandongci.com/style/img/ |
17 KB 17 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pc_cachcard_back.gif
www.hengdiandongci.com/style/img/ |
43 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fraudalert_form.js
www.hengdiandongci.com/js/ |
950 B 1023 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
pageServlet
www.hengdiandongci.com/api/ |
2 B 28 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NotoSansCJKjp-RegularSubset.woff
www.hengdiandongci.com/style/font/ |
160 KB 0 |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
question.svg
www.hengdiandongci.com/style/img/ |
717 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
seal.min.js
seal.digicert.com/seals/cascade/ |
8 KB 8 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_img04.png
www.hengdiandongci.com/style/img/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_img05.png
www.hengdiandongci.com/style/img/ |
18 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_img06.png
www.hengdiandongci.com/style/img/ |
17 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
f.js
static.fraud-alert.net/ |
56 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
arrow_gray.svg
www.hengdiandongci.com/style/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
NotoSansCJKjp-MediumSubset.woff
www.hengdiandongci.com/style/font/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
accept
p.fraud-alert.net/ |
31 B 519 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
localhost/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.hengdiandongci.com
- URL
- https://www.hengdiandongci.com/style/img/arrow_gray.svg
- Domain
- www.hengdiandongci.com
- URL
- https://www.hengdiandongci.com/style/font/NotoSansCJKjp-MediumSubset.woff
- Domain
- localhost
- URL
- http://localhost/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: au Jibun Bank (Financial)35 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| dataLayer function| $ function| jQuery object| platform function| exeSubmitFormName function| exeSubmitFormNameArg function| exeSubmitFormNameOwn function| exeSubmitFormNameArgOwn function| exeSubmitMain function| delComma function| delDateString function| disabledOff function| editComma function| editDateString function| windowOpen function| setExtendedTimeout function| isUserAgentWebView string| ua object| sp_meta object| pc_meta function| api boolean| b function| eye object| __dcid string| siteId string| cookieDomain string| urlForFA string| sessionIdForFA object| _cpaq object| __Cascade object| $jscomp object| JSON_PIWIK object| Piwik object| AnalyticsTracker function| piwik_log4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.hengdiandongci.com/ | Name: JSESSIONID Value: 0B199A0B80AA59F456D344180F0ABEFD |
|
www.hengdiandongci.com/ | Name: _pk_id.1077564906.23cf Value: 3e112f82155f8686.1727771295.1.1727771295.1727771295. |
|
www.hengdiandongci.com/ | Name: _pk_ses.1077564906.23cf Value: * |
|
.fraud-alert.net/ | Name: caulisCookie Value: 1105774232510390272 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
localhost
p.fraud-alert.net
seal.digicert.com
static.fraud-alert.net
www.hengdiandongci.com
localhost
www.hengdiandongci.com
13.251.181.147
154.91.176.218
2600:9000:26a7:e00:10:3572:e540:93a1
3.164.110.26
0839d3213e0b96f1915992feecadcc67f9b983ff77ea387b0805ee0a51323e8a
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
1dffa14ea00339fb59b13b3e2aa769fdb769d5d67bd3d8238ee5cdcb14bf0f49
275c9465b2561fcc96e4f99beb30d8bb4156f3405b6cb8354a51c1af400b771e
4cf9036abe69464fdacd45e96d84ef45400515e75cfa4a1411b2a6d23e286fc8
60fb7676356c6f47177b6a602932a741b2368577fa6c33c5b1d383bdff7dd899
68c6d438afdae5288bf813d5e126a7c9f849238e46c96702614598cab3d1b51a
6b2cfc91bcb1bcdf077aad92873045da05e3fc81706797e120ff7384a8cdbd3d
7644ed95768ef11745d9721a02060a8cddc9d99ff6e6abfc79f24d6093e3e4cc
79b58b88d2400e693ed7c89099cffe25a471b83c372ba638284503a72b2406f4
81f277888d1ee510668666fb819bcf637e488b613dac15cf78cbe9d1ac41658c
9606095ff57e48fc137b15e8171ae6eab1b2cdeb99289d62103d3bfa56569ca1
a2759491fccf1317c5cb397216a9de3aab5c6d9eb6f1d16b543c3dd1afc9af2f
af27551b9848d5372f44520be54c67c2bc0fd9f759aee442943a543d30232b7f
c3b78b1b07598ebf8d5b1575ebc0c93cf5f60a895fbc66e848a0c01a0ff913ac
c4da264867121b9f488748d2536849b092ba8df1e0529b45c4fa146d20d54b4c
c7dae3c7ee9f18d0e2c6c58877284c7e3efc52061a2ed31db79c6f4456ad1ee0
d8d91b2e06df73d70eb998e274b63b433db68b4fa1cfd0904f21f139b14c5567
e557e6c5f8c1025b144bbca671c314820302284a1ab5c6f4151bc39de0d7b413
e8881877c2878d17c77087ae8395eeb362b57e2c41aa0970eca42ee2ad3cecbf