docomn.j5q.top
Open in
urlscan Pro
182.16.72.82
Malicious Activity!
Public Scan
Submission Tags: krdprod
Submission: On October 04 via api from JP — Scanned from DE
Summary
TLS certificate: Issued by R3 on October 3rd 2021. Valid for: 3 months.
This is the only time docomn.j5q.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Softbank (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 182.16.72.82 182.16.72.82 | 45753 (NETSEC-HK...) (NETSEC-HK Netsec Limited) | |
2 | 2a02:26f0:6c0... 2a02:26f0:6c00:283::1a55 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2600:9000:223... 2600:9000:223f:600:10:3572:e540:93a1 | () () | |
18 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
j5q.top
docomn.j5q.top |
199 KB |
2 |
softbank.jp
cdn.softbank.jp |
6 KB |
1 |
fraud-alert.net
static.fraud-alert.net p.fraud-alert.net Failed |
22 KB |
0 |
bootcdn.net
Failed
cdn.bootcdn.net Failed |
|
18 | 4 |
Domain | Requested by | |
---|---|---|
12 | docomn.j5q.top |
docomn.j5q.top
|
2 | cdn.softbank.jp |
docomn.j5q.top
|
1 | static.fraud-alert.net |
docomn.j5q.top
|
0 | p.fraud-alert.net Failed |
docomn.j5q.top
|
0 | cdn.bootcdn.net Failed |
docomn.j5q.top
|
18 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
softbanki.j-l.top R3 |
2021-10-03 - 2022-01-01 |
3 months | crt.sh |
cdn.softbank.jp Cybertrust Japan SureServer EV CA G3 |
2021-06-29 - 2022-07-28 |
a year | crt.sh |
*.fraud-alert.net Amazon |
2020-11-09 - 2021-12-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://docomn.j5q.top/
Frame ID: 5F53E6222DE515C903D2E2FCFAA01A1B
Requests: 18 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
docomn.j5q.top/ |
19 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
docomn.j5q.top/css/ |
570 KB 51 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
docomn.j5q.top/js/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-common.css
docomn.j5q.top/css/ |
26 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-temporary.css
docomn.j5q.top/css/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notice_pcidss_y_tls.css
docomn.j5q.top/css/ |
940 B 503 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
docomn.j5q.top/css/ |
284 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validate_sbid_auth.js
cdn.softbank.jp/mysoftbank/set/data/add/casis/11/js/shared/ |
19 KB 6 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-header-mysb.png
docomn.j5q.top/css/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-logo.png
docomn.j5q.top/css/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switch_blind.png
cdn.softbank.jp/mysoftbank/set/data/add/casis/11/img/shared/ |
261 B 401 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
docomn.j5q.top/css/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
docomn.j5q.top/css/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
docomn.j5q.top/css/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
c.js
static.fraud-alert.net/ |
62 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg_switch_blind.png
docomn.j5q.top/img/shared/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
accept
p.fraud-alert.net/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdn.bootcdn.net
- URL
- https://cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/layer.min.css
- Domain
- docomn.j5q.top
- URL
- https://docomn.j5q.top/img/shared/bg_switch_blind.png
- Domain
- p.fraud-alert.net
- URL
- https://p.fraud-alert.net/accept?action_name=%E3%83%AD%E3%82%B0%E3%82%A4%E3%83%B3%20%7C%20My%20SoftBank%20%7C%20%E3%82%BD%E3%83%95%E3%83%88%E3%83%90%E3%83%B3%E3%82%AF&idsite=1327484702&rec=1&r=704322&h=0&m=40&s=54&url=https%3A%2F%2Fdocomn.j5q.top%2F&_id=61b3f7893c02d08e&_idts=1633308054&_idvc=1&_idn=0&_refts=0&_viewts=1633308054&send_image=1&_tz=0&_language=en-US&_languages=en-US%2Cen&_syslanguage=&_userlanguage=&_browserlanguage=&pdf=1&qt=0&realp=0&wma=0&dir=0&fla=0&java=0&gears=0&ag=0&cookie=1&res=1600x1200&_cvar=%7B%221%22%3A%5B%22sessionId%22%2C%22687079e00b1be5aab7188c5f51afe8fc583eb41b6cf93ee9cc17b53875d8e17920210809105757%22%5D%7D>_ms=1119&pv_id=pfwXMs
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Softbank (Telecommunication)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
docomn.j5q.top/ | Name: PHPSESSID Value: irm49fj9b4gjfspp2oe3cq52f0 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcdn.net
cdn.softbank.jp
docomn.j5q.top
p.fraud-alert.net
static.fraud-alert.net
cdn.bootcdn.net
docomn.j5q.top
p.fraud-alert.net
182.16.72.82
2600:9000:223f:600:10:3572:e540:93a1
2a02:26f0:6c00:283::1a55
045953300026ca6ad4ca4412e7ee494bed9b881f6545d60f1534113a7bf777ef
21cafb6e71a6112d3c1f4777fefa66300fa3e09db01fc7b92dfee436b8373e2c
25f809d40a5363ad86b009d667995921b3912c6dc5ca2be2c6d80013aa6f8495
2c715064551871608d85a55d90449052118e4b50b27e77ae3dd18973f37f4914
59a15b6d9f1bdcf5fbc2e5efe9a49b119d16bba1fbd80610a1d79119535aa00e
84c682ba3502718b4d5022a461d4d2ed1c162ab2d28d6aad64f8ff807309c9d4
91c9440193345cee5393dc441e5400280659e18f45929ae64f82242773803f0c
bbfe1536a99000acceb61f549aa59354cc596efc9f10d3843aab6b273f5adb1e
ca466c36e848b86b42a891a40f896392a88040c80a90dc186d27019478882bee
df3d1608e4ab20082b5556e209ea790f16cfaabe519e1f26d4f23986191c967c
e6896774bf8442fe899391eed8a6cb967f1449fe69d038c4f8e43533a396c6c9
f87f7c87a3b267124b78fcce7aa4d4a80365da2aca40c21d755b581395c743a8