my.connect.au1-singin1.ycav0cc.cn
Open in
urlscan Pro
66.154.107.186
Malicious Activity!
Public Scan
Submission: On February 27 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on February 27th 2022. Valid for: 3 months.
This is the only time my.connect.au1-singin1.ycav0cc.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: au ID (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 66.154.107.186 66.154.107.186 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 2606:4700:303... 2606:4700:3032::ac43:c82d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 2 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
my.connect.au1-singin1.ycav0cc.cn |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
ycav0cc.cn
my.connect.au1-singin1.ycav0cc.cn |
267 KB |
1 |
test-qi-1.buzz
www.test-qi-1.buzz |
606 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
10 | my.connect.au1-singin1.ycav0cc.cn |
my.connect.au1-singin1.ycav0cc.cn
|
1 | www.test-qi-1.buzz |
my.connect.au1-singin1.ycav0cc.cn
|
11 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
id.auone.jp |
www.kddi.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
my.connect.au2-singin2.edpq6sw.cn R3 |
2022-02-27 - 2022-05-28 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-02-04 - 2023-02-04 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://my.connect.au1-singin1.ycav0cc.cn/
Frame ID: 7744C3B2865E10E9CFD34A6CC85FF8C1
Requests: 11 HTTP requests in this frame
9 Outgoing links
These are links going to different origins than the main page.
Title: プライベートブラウズのオフ設定手順は、こちら
Search URL Search Domain Scan URL
Title: ガイド
Search URL Search Domain Scan URL
Title: パスワードを忘れた方はこちら
Search URL Search Domain Scan URL
Title: au IDを新規登録するau以外の方もご登録いただけます
Search URL Search Domain Scan URL
Title: au ID利用規約
Search URL Search Domain Scan URL
Title: 個人情報取扱共通規約
Search URL Search Domain Scan URL
Title: プライバシーポリシー
Search URL Search Domain Scan URL
Title: サイトポリシー
Search URL Search Domain Scan URL
Title: アクセスデータについて
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
my.connect.au1-singin1.ycav0cc.cn/ |
685 B 513 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.7a4fea99084fe05ceada694642ad9268.css
my.connect.au1-singin1.ycav0cc.cn/static/css/ |
735 KB 135 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
manifest.057ee3431c0ab1fc5521.js
my.connect.au1-singin1.ycav0cc.cn/static/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.c7fe81d82560e78d0ff4.js
my.connect.au1-singin1.ycav0cc.cn/static/js/ |
233 KB 82 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.44289bd6d159ae874271.js
my.connect.au1-singin1.ycav0cc.cn/static/js/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
11.1b905f0421a935615a5a.js
my.connect.au1-singin1.ycav0cc.cn/static/js/ |
993 B 587 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
au.php
www.test-qi-1.buzz/ |
1 B 606 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
my.connect.au1-singin1.ycav0cc.cn/ |
6 B 253 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
0.8b6776ad7852c2630193.js
my.connect.au1-singin1.ycav0cc.cn/static/js/ |
15 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7.e10d8ab5840700d573ad.js
my.connect.au1-singin1.ycav0cc.cn/static/js/ |
10 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
au_id.7e12691.jpg
my.connect.au1-singin1.ycav0cc.cn/static/img/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: au ID (Telecommunication)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone function| webpackJsonp object| __core-js_shared__ object| core object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
my.connect.au1-singin1.ycav0cc.cn/ | Name: PHPSESSID Value: ippuj4tu7mrrm942v6im3t0le4 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
my.connect.au1-singin1.ycav0cc.cn
www.test-qi-1.buzz
2606:4700:3032::ac43:c82d
66.154.107.186
1e76ef9ee0fca6def0ddc7156da64fe268830b17ca5649dd1be90cfa1981ebbf
1ec5abc3e4e21e84224089afccec3c1677323ec02fe04f2bbf6083a9b9d3fc2d
28c126a7ca6dd3299980599cdd13fc32181d1a893b809eef59adb5cf5a6bd9f7
2ba8689e81135d7c0700e8eece476c7dfb04d462a41d1a77d4f7348e41aedb88
6588193df7b2367b381f35beae690c46293cf3119956e0687acedddcb6a28b14
6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
bd41213bd68517e0ed3923bbb99d518d9174acde1eeebd6907b970bb539e6501
c7e71dd5dd17539d4082f74f8ceac592e9626e01d604328806c4cd6f3c498299
d524c1a0811da49592f841085cc0063eb62b3001252a94542795d1ca9824a941
d99d9d825130bf91548176512839296310d588eeaa494444e82f7d3d0fd4ec5c
eaf3e2480e79f90e17c9dce43db74e573255a64cbafa49b4d087b4a0db035597