jccwebxxa.monster
Open in
urlscan Pro
23.234.203.145
Malicious Activity!
Public Scan
Effective URL: https://jccwebxxa.monster/login.php
Submission Tags: phishing jcb Search All
Submission: On December 22 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on December 22nd 2021. Valid for: 3 months.
This is the only time jccwebxxa.monster was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: JCB (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 16 | 23.234.203.145 23.234.203.145 | 35916 (MULTA-ASN1) (MULTA-ASN1) | |
15 | 1 |
ASN35916 (MULTA-ASN1, US)
PTR: flip.schoolroutinetips.com
jccwebxxa.monster |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
jccwebxxa.monster
1 redirects
jccwebxxa.monster |
126 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
16 | jccwebxxa.monster |
1 redirects
jccwebxxa.monster
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.jcb.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
jccwebxxa.monster R3 |
2021-12-22 - 2022-03-22 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jccwebxxa.monster/login.php
Frame ID: F7E4382E588D28101670880740D62C74
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
JCBの会員専用WEBサービス「MyJCB(マイジェーシービー)」Page URL History Show full URLs
-
https://jccwebxxa.monster/
HTTP 302
https://jccwebxxa.monster/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: 詳しくはこちら
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://jccwebxxa.monster/
HTTP 302
https://jccwebxxa.monster/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
jccwebxxa.monster/ Redirect Chain
|
13 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
jccwebxxa.monster/login_files/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.css
jccwebxxa.monster/login_files/ |
31 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
global.js
jccwebxxa.monster/login_files/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.js
jccwebxxa.monster/login_files/ |
56 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
master.js
jccwebxxa.monster/login_files/ |
828 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery_002.js
jccwebxxa.monster/login_files/ |
69 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rsa.js
jccwebxxa.monster/login_files/ |
36 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
jccwebxxa.monster/login_files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_blank.png
jccwebxxa.monster/login_files/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
error-icon.png
jccwebxxa.monster/login_files/ |
350 B 555 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_footer.png
jccwebxxa.monster/login_files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.js
jccwebxxa.monster/login_files/ |
85 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
jccwebxxa.monster/login_files/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
frame.js
jccwebxxa.monster/login_files/ |
31 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: JCB (Financial)74 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| focusNext function| focusTo function| openProhibitCharactersWindowJcb function| openProhibitCharactersWindowIy function| allDisable function| getCookie function| setCookie function| removeCookie object| RegAndroid object| RegiPhone function| isSmp function| isSpWidth function| getUrlParam function| getRedirectUrl function| getUrl function| removeSmpCookieForDomain function| removeSmpSessionCookie function| displaySmpLink function| setRwdFlag function| getIOSVersionNumber function| $ function| jQuery function| popup function| popup2 function| MM_openBrWindow function| setJcbTopCookie function| setMyJCookie function| Hashtable function| startsWith function| DomDataCollection function| IE_FingerPrint function| Mozilla_FingerPrint function| Opera_FingerPrint function| Timer function| getRandomPort object| ProxyCollector function| BlackberryLocationCollector function| detectFields string| SEP string| PAIR string| DEV function| FingerPrint function| urlEncode function| encode_deviceprint function| decode_deviceprint function| post_deviceprint function| post_fingerprints function| add_deviceprint function| form_add_data function| form_add_deviceprint string| HTML5 string| BLACKBERRY string| UNDEFINED string| GEO_LOCATION_DEFAULT_STRUCT object| geoLocator boolean| geoLocatorStatus function| detectDeviceCollectionAPIMode function| init function| startCollection function| stopCollection function| getGeolocationStruct function| HTML5LocationCollector object| UIEventCollector function| UIEvent function| InteractionElement function| UIElementList function| activeXDetect function| stripIllegalChars function| stripFullPath object| BrowserDetect function| convertTimestampToGMT function| getTimestampInMillis function| debug function| forceIE89Synchronicity1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jccwebxxa.monster/ | Name: PHPSESSID Value: 13fj2cim85k03j4r8un013i2g9 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jccwebxxa.monster
23.234.203.145
079ad8bcc01fc08b38e783b12d89d4629508d1e3ba8cafb9962030650f1a9b89
27a96a60418030e62d3b6ff174e3559b0aa47f99357334affdba7d9a684360ec
41c9a7bc7a33f8b367ee44cc6422521c3b221b906ee1cb559060b6f28f4e095c
6034aa1a5202485c861be5b8b5664b920a6ba8e02f65bea1ba7419ad736145c1
793c2f3d02d0bc3ad8a2cdc901b2134159b66245e951ac258fee1ac8b2709f44
80adebc84b57ccb10f21a41231e22b5b051bbe66a81385536650b42e1fd2b50a
87083882cc6015984eb0411a99d3981817f5dc5c90ba24f0940420c5548d82de
8c0301b3dba5061632d7321cd8bb7bd527f48288d5cb15ff614ea0c1dcc1ad69
93b334e1a1d3b1f7ad60a247c93d72e8d3c03db8b81bc4c4184ad3a3d7ce5b62
b9ccc3e001b97d79262c5d5a5270bba88676f2ffb6549f902a6d4077b5345a6f
c8370a2d050359e9d505acc411e6f457a49b21360a21e6cbc9229bad3a767899
c9201d468dddf3a23a57bb912500032ee22b6bdc69c5d59eb8cee9ff46083c6b
db1562dddef637d43719ea11584ca6a43dc9502551a8308e5c0c32b8fbf4eeac
e31442527b933ae1b5c67fea7b4e2f71ad41c7872707ee2c399fadf8f2c8997d
e7c36067725c1dc813cf4700514300c05f9752ac982a39900efc12f21bbe3b53