fasfkhagsfkjajj.com
Open in
urlscan Pro
2606:4700:3033::ac43:c2d2
Malicious Activity!
Public Scan
Effective URL: http://fasfkhagsfkjajj.com/ibretail/login
Submission: On November 17 via manual from JP
Summary
This is the only time fasfkhagsfkjajj.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: au Jibun Bank (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 17 | 2606:4700:303... 2606:4700:3033::ac43:c2d2 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 23.67.135.134 23.67.135.134 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
19 | 2 |
ASN20940 (AKAMAI-ASN1, EU)
PTR: a23-67-135-134.deploy.static.akamaitechnologies.com
seal.websecurity.norton.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
fasfkhagsfkjajj.com
1 redirects
fasfkhagsfkjajj.com |
39 KB |
3 |
norton.com
seal.websecurity.norton.com |
675 B |
19 | 2 |
Domain | Requested by | |
---|---|---|
17 | fasfkhagsfkjajj.com |
1 redirects
fasfkhagsfkjajj.com
|
3 | seal.websecurity.norton.com |
fasfkhagsfkjajj.com
|
19 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
seal.websecurity.norton.com DigiCert SHA2 Extended Validation Server CA |
2020-03-23 - 2022-04-03 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://fasfkhagsfkjajj.com/ibretail/login
Frame ID: F3AC0881E0DBD3E49DA2EA36802D86B1
Requests: 19 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://fasfkhagsfkjajj.com/
HTTP 302
http://fasfkhagsfkjajj.com/ibretail/login Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://fasfkhagsfkjajj.com/
HTTP 302
http://fasfkhagsfkjajj.com/ibretail/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
fasfkhagsfkjajj.com/ibretail/ Redirect Chain
|
25 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
import.css
fasfkhagsfkjajj.com/ibretail/smartphone/css/ |
320 B 913 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
top.css
fasfkhagsfkjajj.com/ibretail/smartphone/css/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
japanization-common.js
fasfkhagsfkjajj.com/ibretail/smartphone/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
misc.js
fasfkhagsfkjajj.com/ibretail/smartphone/js/ |
244 B 960 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
SmartPhone.inc
fasfkhagsfkjajj.com/ibretail/smartphone/inc/ |
2 KB 3 KB |
Script
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sp_cachcard_back.gif
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
7 KB 8 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spacer.gif
fasfkhagsfkjajj.com/ibretail/img/cmn/ |
43 B 764 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
getseal
seal.websecurity.norton.com/ |
13 B 217 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
getseal
seal.websecurity.norton.com/ |
43 B 241 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
reset.css
fasfkhagsfkjajj.com/ibretail/smartphone/css/ |
655 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
common.css
fasfkhagsfkjajj.com/ibretail/smartphone/css/ |
25 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_header.png
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
127 B 845 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg_title2.png
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
205 B 933 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_attention.png
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
256 B 977 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
btn_bg.png
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
173 B 895 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_popup.png
fasfkhagsfkjajj.com/ibretail/smartphone/images/ |
164 B 886 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
getseal
seal.websecurity.norton.com/ |
13 B 217 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: au Jibun Bank (Financial)33 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes string| setDisableId function| moveToTop function| KeyEvent function| disableTargetId function| setTargetId function| disableAllLinks object| backupLinks function| disablePDF function| ablePDF function| popWin function| addfooter boolean| uid1 boolean| uid2 boolean| pid boolean| capsOn boolean| submitenable string| parameterName function| flogonSubmit function| getparam function| fLogon function| f_key function| initThis function| initKybdTarget boolean| l_isNS6 function| setCaps function| fncLogPassReg function| fncLogPassReset string| SEC_JAVA_SCRIPT_TAG_START string| SEC_JAVA_SCRIPT_TAG_END string| SEC_SRC_PARAM_START string| SEC_SRC_PARAM_END string| sealScript2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
fasfkhagsfkjajj.com/ | Name: mercar:sid Value: s%3Af25a484f-03fd-4385-9072-10748e6ac325.dcQI98msBjT5hw0LAPgzpfedZanfoZw6f0SzQQM6EyM |
|
.fasfkhagsfkjajj.com/ | Name: __cfduid Value: d97c37a1cc3841fff0239b1dea60ee9ef1605600359 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fasfkhagsfkjajj.com
seal.websecurity.norton.com
23.67.135.134
2606:4700:3033::ac43:c2d2
0e7a10a3e4edb22419d870b3fcc059f16e3b33e6ac72ccd50314e7a11b039842
425343f17dee6ddaf9910e8dd4c8ed0324261b772f200998de99b73b614cef66
456aef009b13ead0672e8bab7de6a86478384e85afabad66d505d093a6c310e5
4899d443a0f1bc1bb5b8dc1aaf70f428f2f440bede0ffbaea1a09ead63c43989
548f2d6f4d0d820c6c5ffbeffcbd7f0e73193e2932eefe542accc84762deec87
6cd1c49cf668016db93d36805fa6db27b257eb2d6e0959106f3d36196ff8606f
7552775ec0a71d713dd2440f4216531067100108509ef88f5507b3ad95e30d28
784cc19d293ddde4275716abae8427a2c4106ee5e693472f2933c02fe527a352
88c6c9f6e3a6a8ddb566facfd6711a96b9d8d6c8e3091113525c7511107a8885
9ae4902c61b574db9d7b84372465c95dc76cb0164d09797c8abb35ab09707e4e
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7
acc52da07e2bcfc432e335beab2bc9f77df06d4cf51653b8bcc52a52b5389ad6
adb565b3371f6b20c716b7960c6f87ede0233fb35b977d3735296b00029cc078
bb807cd3b9903a753407ec9d82c403490bad87e9b707458b7d0e7f165277cd2c
c81a80d814dd1474aed4f163d6a40c484a7b4630e1acbdb1d31d16ffb7012916
d42547731a54c9b4ea579e0d1f97364aadf366efc1e675933782b80e1a4e6a91
d8d3eaa2b3676e15cba37a43ec0cdc218a9e6ad46f0f545600d93270ac71ded7
e7144d1642eb88720c98ae251e6c45c9f615a4bd26e487781bb23579d93cb836