jpchase.team
Open in
urlscan Pro
20.52.139.161
Malicious Activity!
Public Scan
Effective URL: http://jpchase.team/login
Submission: On December 28 via api from US
Summary
This is the only time jpchase.team was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chase (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 20.52.139.161 20.52.139.161 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
5 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2) | |
5 | 2400:8901::f0... 2400:8901::f03c:91ff:fe10:6844 | 63949 (LINODE-AP...) (LINODE-AP Linode) | |
2 | 2a00:1450:400... 2a00:1450:4001:825::2003 | 15169 (GOOGLE) (GOOGLE) | |
20 | 6 |
ASN63949 (LINODE-AP Linode, LLC, US)
idevcorner.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
idevcorner.com
idevcorner.com |
64 KB |
5 |
cloudflare.com
cdnjs.cloudflare.com |
104 KB |
5 |
jpchase.team
1 redirects
jpchase.team |
505 KB |
3 |
fontawesome.com
use.fontawesome.com |
95 KB |
2 |
gstatic.com
fonts.gstatic.com |
22 KB |
1 |
googleapis.com
fonts.googleapis.com |
1 KB |
20 | 6 |
Domain | Requested by | |
---|---|---|
5 | idevcorner.com |
jpchase.team
|
5 | cdnjs.cloudflare.com |
jpchase.team
cdnjs.cloudflare.com |
5 | jpchase.team |
1 redirects
jpchase.team
|
3 | use.fontawesome.com |
jpchase.team
use.fontawesome.com |
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
jpchase.team
|
20 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1O1 |
2020-11-10 - 2021-02-02 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2020-11-13 - 2021-12-14 |
a year | crt.sh |
idevcorner.com Sectigo RSA Domain Validation Secure Server CA |
2020-12-13 - 2022-01-13 |
a year | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-11-10 - 2021-02-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://jpchase.team/login
Frame ID: 305D8D1AFEA5D70E1B35705F0F8A9938
Requests: 20 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://jpchase.team/
HTTP 302
http://jpchase.team/login Page URL
Detected technologies
Material Design Lite (Web Frameworks) ExpandDetected patterns
- html /<link[^>]* href="[^"]*material(?:\.[\w]+-[\w]+)?(?:\.min)?\.css/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href="https:\/\/use\.fontawesome\.com\/releases\/v([^>]+)\/css\//i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Ionicons (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+ionicons(?:\.min)?\.css/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://jpchase.team/
HTTP 302
http://jpchase.team/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
jpchase.team/ Redirect Chain
|
13 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
8 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionicons.css
cdnjs.cloudflare.com/ajax/libs/ionicons/4.5.5/css/ |
52 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.css
use.fontawesome.com/releases/v5.13.0/css/ |
57 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v4-shims.css
use.fontawesome.com/releases/v5.13.0/css/ |
26 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap-material.css
idevcorner.com/cdn/css/ |
188 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
shreerang-material.css
idevcorner.com/cdn/css/ |
326 KB 34 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
perfect-scrollbar.css
cdnjs.cloudflare.com/ajax/libs/jquery.perfect-scrollbar/1.4.0/css/ |
3 KB 865 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
authentication.css
jpchase.team/assets/CSS/ |
2 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-white.svg
jpchase.team/img/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/ |
85 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script_frontend.js
idevcorner.com/cdn/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.js
cdnjs.cloudflare.com/ajax/libs/twitter-bootstrap/4.3.1/js/ |
129 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
script_frontend.js
idevcorner.com/cdn/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sidenav.js
idevcorner.com/cdn/js/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
background-3.jpeg
jpchase.team/img/Day/ |
488 KB 488 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4AMP6lQ.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionicons.woff2
cdnjs.cloudflare.com/ajax/libs/ionicons/4.5.5/fonts/ |
49 KB 50 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fa-brands-400.woff2
use.fontawesome.com/releases/v5.13.0/webfonts/ |
75 KB 75 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chase (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| bootstrap function| SideNav1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jpchase.team/ | Name: PHPSESSID Value: be40534c6e59a11f7f22aa4c5242a45f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
idevcorner.com
jpchase.team
use.fontawesome.com
20.52.139.161
23.111.9.35
2400:8901::f03c:91ff:fe10:6844
2606:4700::6810:125e
2a00:1450:4001:802::200a
2a00:1450:4001:825::2003
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
19f150cf1e8aefc4674a88255d2f085da4b84b779fc7b75308a43512eb86a8d6
1c395880a354fb46690f8c5c89a9c7ea9b19e6de637f6736370b93e4d041e43e
2d9913a0cc8a5804e861b9f6589443a67b22e652cc7a3b599850abb95cc057ad
31361db9d38026e3ed85a2bc7f71148e3e91fbbe41539357fddac9670de33a77
406ed1bddec46761296968983c8c3ceabf4238ef7c4d3e65eca6a4c443fb0367
5d1bc9b443f3f81fa4b4ad4634c1bb9702194c1898e3a9de0ab5e2cdc0e9f479
5d9190292acdd48ba0fc35080f7e7448f3cdf0d79199a4d23f0f49b5341fdf29
5db4371141d3ca5d533912e3ae1133c9f26d8dc34b09bb8d5087a2b8666a804b
63b4db238dd2d7344fcea21e33d1edaaec73b29a3caca168ba4fa0e0382cc5d0
7b6508c9e8e04de8ebfec5de2ce1c4303bc46a0a279283eff7e248c1c900a91b
876d023d9d10c97941b80c3b03e2a5b94631ff7a4af9cee5604a6a2d39718d84
8e6aca61ef7ae907707da4e2eab6e98cd4b3d80e0996adaee6b3fcb627ee5a1f
a65d5b4abb65aad37f302c96f1751362e2422a8869f7f889112556d77e384813
b47ab02133f6d6b98efa31588b443a9ff9f8a7d2ebb0af0a95f203033b97c720
b534bf5439e6346255cdfe8506bf01a71925106f3323dff2eccf2e7266b06929
c0ded025aa80c10d37920521c8de04536a6145d0e42eb4186c57b412fa50eb45
ce897833ac6e362df7c91ac8223fe511c6defcf33964928a81004600a2dd4c2e
d887f244c8727f44a93e24d5bbf13ab82fb7ebdccae6e4e9515cbbf5bda85265