illjp15jpb.monster
Open in
urlscan Pro
2606:4700:3033::ac43:8647
Malicious Activity!
Public Scan
Effective URL: https://illjp15jpb.monster/Wi708n0b00saOEr08d67/index.html
Submission: On November 08 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by GTS CA 1P5 on October 15th 2023. Valid for: 3 months.
This is the only time illjp15jpb.monster was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
19 | 2606:4700:303... 2606:4700:3033::ac43:8647 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
1 | 103.126.138.87 103.126.138.87 | 40676 (AS40676) (AS40676) | |
21 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
illjp15jpb.monster
illjp15jpb.monster |
193 KB |
1 |
ipwho.is
ipwho.is — Cisco Umbrella Rank: 86087 |
956 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 762 |
27 KB |
0 |
Failed
function sub() { [native code] }. Failed |
|
21 | 4 |
Domain | Requested by | |
---|---|---|
19 | illjp15jpb.monster |
illjp15jpb.monster
|
1 | ipwho.is |
illjp15jpb.monster
|
1 | code.jquery.com |
illjp15jpb.monster
|
0 | truncated Failed |
illjp15jpb.monster
|
21 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
illjp15jpb.monster GTS CA 1P5 |
2023-10-15 - 2024-01-13 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
ipwho.is GoGetSSL ECC DV CA |
2023-04-05 - 2024-04-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://illjp15jpb.monster/Wi708n0b00saOEr08d67/index.html
Frame ID: F2ECA4A34957A1B186B5A2E9507C2588
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
C0mputer Err00r 020x1V7GT0Vx07BPage URL History Show full URLs
- https://illjp15jpb.monster/b.html Page URL
- https://illjp15jpb.monster/Wi708n0b00saOEr08d67/index.html Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://illjp15jpb.monster/b.html Page URL
- https://illjp15jpb.monster/Wi708n0b00saOEr08d67/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
b.html
illjp15jpb.monster/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
index.html
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
21 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
tapa.css
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
17 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.4.4.min.js
code.jquery.com/ |
77 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
noir.js
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
82 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
f24.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
mnc.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
187 B 693 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
msmm.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
168 B 671 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
set.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
364 B 869 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
vsc.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
722 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bx1.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
97 KB 98 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bel.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
276 B 777 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pcm.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
dm.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
332 B 833 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cs.png
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
re.gif
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
14 KB 15 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
nvidia.js
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jupiter.js
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
503 B 731 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
ipwho.is/ |
684 B 956 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
truncated
/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
_Fm7-alert.mp3
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
226 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ai2.mp3
illjp15jpb.monster/Wi708n0b00saOEr08d67/ |
548 B 982 B |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- truncated
- URL
- data:truncated
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery object| t function| toggleFullScreen function| addEvent object| modal object| btn undefined| span number| e number| isNS function| mischandler function| mousehandler function| win_onkeydown_handler string| ipadd string| city string| country string| isp string| currtime0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
illjp15jpb.monster
ipwho.is
truncated
truncated
103.126.138.87
2606:4700:3033::ac43:8647
2a04:4e42::649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