eki-net-jp2.top
Open in
urlscan Pro
194.124.216.11
Malicious Activity!
Public Scan
Effective URL: https://eki-net-jp2.top/login.php
Submission Tags: phishing jr east Search All
Submission: On March 17 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on March 17th 2023. Valid for: 3 months.
This is the only time eki-net-jp2.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: JR East (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 45.117.101.242 45.117.101.242 | 4785 (XTOM-AS-J...) (XTOM-AS-JP xTom) | |
1 | 172.67.182.3 172.67.182.3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 23 | 194.124.216.11 194.124.216.11 | 3214 (XTOM xTom...) (XTOM xTom GmbH) | |
23 | 3 |
ASN4785 (XTOM-AS-JP xTom, JP)
PTR: 45.117.101.242.static.xtom.com
jpcom.cc |
ASN3214 (XTOM xTom GmbH, DE)
PTR: 194.124.216.11.static.xtom.com
eki-net-jp2.top |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
eki-net-jp2.top
2 redirects
eki-net-jp2.top |
3 MB |
1 |
workers.dev
wispy-poetry-2d2b.kpedhgrt.workers.dev |
526 B |
1 |
jpcom.cc
1 redirects
jpcom.cc |
225 B |
0 |
bootcdn.net
Failed
cdn.bootcdn.net Failed |
|
23 | 4 |
Domain | Requested by | |
---|---|---|
23 | eki-net-jp2.top |
2 redirects
wispy-poetry-2d2b.kpedhgrt.workers.dev
eki-net-jp2.top |
1 | wispy-poetry-2d2b.kpedhgrt.workers.dev | |
1 | jpcom.cc | 1 redirects |
0 | cdn.bootcdn.net Failed |
eki-net-jp2.top
|
23 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.eki-net.com |
secure.okbiz.okwave.jp |
www.jreast.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.kpedhgrt.workers.dev GTS CA 1P5 |
2023-03-11 - 2023-06-09 |
3 months | crt.sh |
eki-net-jp2.top R3 |
2023-03-17 - 2023-06-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://eki-net-jp2.top/login.php
Frame ID: CBC927E77FC6E67A76144C56A2AB2B9F
Requests: 23 HTTP requests in this frame
Screenshot
Page Title
えきねっと(JR東日本)|ログインPage URL History Show full URLs
-
http://jpcom.cc/LC9c
HTTP 302
https://wispy-poetry-2d2b.kpedhgrt.workers.dev/ Page URL
- https://eki-net-jp2.top/ Page URL
-
https://eki-net-jp2.top/index.php?t=24c1d69a3b8e0f3802e13d4501ed0e7e27273c8a7aca5490985787ec1e77d2f2
HTTP 302
https://eki-net-jp2.top/tiaozhuan.php HTTP 302
https://eki-net-jp2.top/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Akamai Bot Manager (Security) Expand
Detected patterns
Google Tag Manager (Tag Managers) Expand
Detected patterns
- <!-- (?:End )?Google Tag Manager -->
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
14 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: JRきっぷ申込/空席案内
Search URL Search Domain Scan URL
Title: のってたのしい列車(観光列車)の申込
Search URL Search Domain Scan URL
Title: おトクなきっぷの申込
Search URL Search Domain Scan URL
Title: JRきっぷ申込とは
Search URL Search Domain Scan URL
Title: えきねっとトクだ値
Search URL Search Domain Scan URL
Title: 新幹線eチケットサービス
Search URL Search Domain Scan URL
Title: えきねっとチケットレスサービス
Search URL Search Domain Scan URL
Title: JRきっぷ申込 ご利用ガイド
Search URL Search Domain Scan URL
Title: 便利な使い方
Search URL Search Domain Scan URL
Title: ポイント
Search URL Search Domain Scan URL
Title: お問い合わせ
Search URL Search Domain Scan URL
Title: よくあるご質問
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://jpcom.cc/LC9c
HTTP 302
https://wispy-poetry-2d2b.kpedhgrt.workers.dev/ Page URL
- https://eki-net-jp2.top/ Page URL
-
https://eki-net-jp2.top/index.php?t=24c1d69a3b8e0f3802e13d4501ed0e7e27273c8a7aca5490985787ec1e77d2f2
HTTP 302
https://eki-net-jp2.top/tiaozhuan.php HTTP 302
https://eki-net-jp2.top/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://jpcom.cc/LC9c HTTP 302
- https://wispy-poetry-2d2b.kpedhgrt.workers.dev/
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
wispy-poetry-2d2b.kpedhgrt.workers.dev/ Redirect Chain
|
64 B 526 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
eki-net-jp2.top/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.23238u92u82.js
eki-net-jp2.top/vendor/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
eki-net-jp2.top/ Redirect Chain
|
23 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common.css
eki-net-jp2.top/Personal/member/Login/ |
120 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
module.css
eki-net-jp2.top/Personal/member/Login/ |
74 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
member.css
eki-net-jp2.top/Personal/member/Login/ |
20 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
eki-net-jp2.top/Personal/member/Login/ |
39 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
top_searchparts.css
eki-net-jp2.top/Personal/member/Login/ |
119 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
eki-net-jp2.top/admin/im/ |
91 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
eki-net-jp2.top/admin/im/ |
284 KB 105 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
load_font.css
eki-net-jp2.top/Personal/member/Login/ |
768 B 971 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_ekinet.png
eki-net-jp2.top/Personal/member/Login/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_jreast.png
eki-net-jp2.top/Personal/member/Login/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_input_ok.png
eki-net-jp2.top/Personal/member/Login/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_linkblank.png
eki-net-jp2.top/Personal/member/Login/ |
166 B 371 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_linkblank-1.png
eki-net-jp2.top/Personal/member/Login/ |
166 B 371 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
eki-net-jp2.top/admin/im/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
eki-net-jp2.top/admin/im/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
eki-net-jp2.top/admin/im/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NotoSansCJKjp-Regular_subset.woff
eki-net-jp2.top/Personal/member/Login/ |
1 MB 1 MB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
NotoSansCJKjp-Bold_subset.woff
eki-net-jp2.top/Personal/member/Login/ |
1 MB 1 MB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdn.bootcdn.net
- URL
- https://cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/layer.min.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: JR East (Transportation)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery object| layui function| lay number| errors object| layer object| jQuery1101078340937803308554 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
eki-net-jp2.top/ | Name: PHPSESSID Value: 58lfumt7k8tiq2075qnvpj8ol6 |
|
.eki-net-jp2.top/ | Name: 62345ba76168db0033ce8ae6a90ce5a762956614 Value: nwcMGFHjQc7nDOZDxhWlbg%3D%3D |
|
.eki-net-jp2.top/ | Name: _amkc Value: 7b627899-c48a-4ed3-808e-292692d863cc |
|
.eki-net-jp2.top/ | Name: ak_bmsc Value: JgGVxRJWxiWUgoZiejEjpsCIDNsulJOxl8RneWIVwN6N%2F80JsIJFL21ZfNCWelXD9fZF2pTrAVRpAJxPBeJhsf8syW4dMVDCaT3WAjcTwl2l7ZQjlajnlJkh7yb%2FFKX3ykgnEkl3S0aGg%2FYgN1RWI%2B0rpfGKYXEVn4tcYodMjMFQE8fYImnTQUwPH9l5Qi1Qtq6PYP8aF3D6v4%2FGbSpeKdDCO%2F6Ss6yptFt6LvL0ZSmwkG4mwt48zb5sZMZT0DZCKiqSQRwiC837VVOOPXz3n2NmEkmXoIXPu633LHuxyImb3ejojfrmdg7T8W%2Bi8hv1HlXn9SJq0Dg13WoKtM%2F%2F4lqAZ%2BAluRD2JF7onDjJlyYSef4YjzLfL565GsoPRq62cucoOplVJh2%2BKsGftx%2FCUCHYL0UtlpTkJsA3o9uR7zYHDxgb7gl5%2BUZ4j0Ym0fWz8tJ6sAi2%2FcqCc9Q9mchYvqv1OYxTjgN1rIvc4WFhF469JR2nfsOmVbRi7BZtlF1tMzwN82vNjcJcR%2FcBGHochQYz598Vbk4ytqMBBAOV0H519zXb0vEF82ANy70V1zD8UxQLAlTT8814T0giVKojWFNxZQ%2B3iOqesQZCHUYdTtKYjbMJTBevT9roSXMZtmPqGGh28QmGPrybCKib8ET1N9zLFNWm8epQUCvOrylB%2Bqp67gaKCVqiIY4TIxzjQCr2HpBKPSuagXYF6maVwaB0n48D4s7voqNOGTq1t%2BWG6gnOpwQWsKxL1hEDddtYQZA5 |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcdn.net
eki-net-jp2.top
jpcom.cc
wispy-poetry-2d2b.kpedhgrt.workers.dev
cdn.bootcdn.net
172.67.182.3
194.124.216.11
45.117.101.242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