eniorcxcaqomm.misecure.com
Open in
urlscan Pro
150.109.238.219
Malicious Activity!
Public Scan
Effective URL: https://eniorcxcaqomm.misecure.com/info.php
Submission Tags: phishing
Submission: On September 24 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R10 on September 21st 2024. Valid for: 3 months.
This is the only time eniorcxcaqomm.misecure.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: JP Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 150.109.238.219 150.109.238.219 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
1 | 202.79.161.103 202.79.161.103 | 64050 (BGNL-HK B...) (BGNL-HK BGP Network Limited) | |
10 | 3 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
eniorcxcaqomm.misecure.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
misecure.com
1 redirects
eniorcxcaqomm.misecure.com |
170 KB |
1 |
bootcdn.net
cdn.bootcdn.net — Cisco Umbrella Rank: 135331 |
3 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
10 | eniorcxcaqomm.misecure.com |
1 redirects
eniorcxcaqomm.misecure.com
|
1 | cdn.bootcdn.net |
eniorcxcaqomm.misecure.com
|
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
tatry.cn R10 |
2024-09-21 - 2024-12-20 |
3 months | crt.sh |
*.bootcdn.net GlobalSign GCC R6 AlphaSSL CA 2023 |
2024-09-14 - 2025-10-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://eniorcxcaqomm.misecure.com/info.php
Frame ID: 8F1F71543AB3B1F4F2322D2711768365
Requests: 14 HTTP requests in this frame
Screenshot
Page Title
【e-Tax】国税電子申告・納税システム(イータックス)Page URL History Show full URLs
-
https://eniorcxcaqomm.misecure.com/
HTTP 302
https://eniorcxcaqomm.misecure.com/info.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://eniorcxcaqomm.misecure.com/
HTTP 302
https://eniorcxcaqomm.misecure.com/info.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
info.php
eniorcxcaqomm.misecure.com/ Redirect Chain
|
19 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.css
eniorcxcaqomm.misecure.com/css/ |
218 KB 33 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
eniorcxcaqomm.misecure.com/admin/im/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
eniorcxcaqomm.misecure.com/admin/im/ |
284 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
eniorcxcaqomm.misecure.com/admin/im/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
eniorcxcaqomm.misecure.com/admin/im/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
eniorcxcaqomm.misecure.com/admin/im/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
985 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.php
eniorcxcaqomm.misecure.com/ |
13 B 84 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
eniorcxcaqomm.misecure.com/ |
273 B 301 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: JP Government (Government)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| layui function| lay object| layer object| jQuery110109001711948120636 function| heart_beat function| ip_save object| user string| pwd string| appid string| apppwd function| verify1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
eniorcxcaqomm.misecure.com/ | Name: PHPSESSID Value: 49ofnq6cqd3pt9hm9qga9437sa |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcdn.net
eniorcxcaqomm.misecure.com
150.109.238.219
202.79.161.103
0a650466dc50e43ce4470564b1dcf8c2fa141461805c4e986b6cc1e69cb7b9ac
1cbca9d888072a69ec03321adf129a69421c7d0baacacf97c55feeb7968a99cf
4136abcb45c901b2103495b9986d33652acf469c090f4c48fdec1663e5358dab
4db94ae6deee07329172b21a6f6908ec58a209754458237c0472800aa3a02380
5994332aadd364a7350ad226ef61c1c75dc97372f739e01682e190be3abaf672
7cb779ec6f40f84d5c1fe9ff0bed5b810b93a25388331d1703cb6cd65e8e1f93
9077288d2b43f9292fa40378a486589419d03dbc28b07e93f0aa1607c815a8dd
aa3d21398252adb9f16b5208884b4da22eec9f2019a0139b114a61f178396794
bbfe1536a99000acceb61f549aa59354cc596efc9f10d3843aab6b273f5adb1e
d4f26891464c33335a7c80fda1fe247e6586a16395a3edb73ea415a831687928
f99199228144a11b7adda7dad83f11c366ecb6f530ba8a352fb155bc0e58fc0e