cbjets.com
Open in
urlscan Pro
64.40.110.64
Malicious Activity!
Public Scan
Effective URL: https://cbjets.com/inco/rmds.html
Submission: On September 04 via automatic, source phishtank
Summary
TLS certificate: Issued by GlobalSign RSA DV SSL CA 2018 on July 23rd 2020. Valid for: a year.
This is the only time cbjets.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Capitec Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 108.167.143.9 108.167.143.9 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
10 | 64.40.110.64 64.40.110.64 | 14280 (NETNATION) (NETNATION) | |
1 | 2a00:1450:400... 2a00:1450:4001:81b::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::2003 | 15169 (GOOGLE) (GOOGLE) | |
13 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 108-167-143-9.unifiedlayer.com
vagrantgames.com |
ASN14280 (NETNATION, CA)
PTR: aleader3.precisionpros.com
cbjets.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
cbjets.com
cbjets.com |
166 KB |
1 |
gstatic.com
fonts.gstatic.com |
11 KB |
1 |
googleapis.com
fonts.googleapis.com |
504 B |
1 |
vagrantgames.com
vagrantgames.com |
219 B |
13 | 4 |
Domain | Requested by | |
---|---|---|
10 | cbjets.com |
cbjets.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
cbjets.com
|
1 | vagrantgames.com | |
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
autodiscover.makermelissa.com Let's Encrypt Authority X3 |
2020-07-13 - 2020-10-11 |
3 months | crt.sh |
www.cbjets.com GlobalSign RSA DV SSL CA 2018 |
2020-07-23 - 2021-07-24 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-08-19 - 2020-11-11 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-08-19 - 2020-11-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://cbjets.com/inco/rmds.html
Frame ID: C617589F1C52A63FD4FA1579657EADC3
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://vagrantgames.com/bnep.php Page URL
- https://cbjets.com/inco/rmds.html Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://vagrantgames.com/bnep.php Page URL
- https://cbjets.com/inco/rmds.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
bnep.php
vagrantgames.com/ |
108 B 219 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
rmds.html
cbjets.com/inco/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default-3.0.0.css
cbjets.com/inco/ |
55 KB 55 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui-1.8.10.custom.min.css
cbjets.com/inco/ |
18 KB 18 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default.custom.min-1.1.0.css
cbjets.com/inco/ |
18 KB 18 KB |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
860 B 504 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_main.png
cbjets.com/inco/ |
13 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loginSubmitForm-1.0.0.js.download
cbjets.com/inco/ |
18 KB 18 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
proceed.gif
cbjets.com/inco/ |
259 B 416 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
SSL-certificate-seal-ssl-animated.gif
cbjets.com/inco/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
EYqxmaNOzLlWtsZSScy6XTNpcZGf2w.woff2
fonts.gstatic.com/s/ropasans/v10/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.woff
cbjets.com/fonts/ |
18 KB 18 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flama-basic-webfont.ttf
cbjets.com/fonts/ |
18 KB 18 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Capitec Bank (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cbjets.com
fonts.googleapis.com
fonts.gstatic.com
vagrantgames.com
108.167.143.9
2a00:1450:4001:808::2003
2a00:1450:4001:81b::200a
64.40.110.64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