count.mail.163.com.jzipqsut.com
Open in
urlscan Pro
111.90.141.6
Malicious Activity!
Public Scan
Submission: On May 01 via automatic, source openphish
Summary
This is the only time count.mail.163.com.jzipqsut.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Excel / PDF download (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 111.90.141.6 111.90.141.6 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
1 | 2a00:1450:400... 2a00:1450:4001:817::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700:1::... 2606:4700:1::6813:8f6f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:820::2003 | 15169 (GOOGLE) (GOOGLE) | |
6 | 4 |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
PTR: mail1.interer.online
count.mail.163.com.jzipqsut.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
gstatic.com
fonts.gstatic.com |
23 KB |
2 |
gyazo.com
i.gyazo.com |
54 KB |
1 |
googleapis.com
fonts.googleapis.com |
645 B |
1 |
jzipqsut.com
count.mail.163.com.jzipqsut.com |
18 KB |
6 | 4 |
Domain | Requested by | |
---|---|---|
2 | fonts.gstatic.com |
count.mail.163.com.jzipqsut.com
|
2 | i.gyazo.com |
count.mail.163.com.jzipqsut.com
|
1 | fonts.googleapis.com |
count.mail.163.com.jzipqsut.com
|
1 | count.mail.163.com.jzipqsut.com | |
6 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
upload.video.google.com GTS CA 1O1 |
2020-04-07 - 2020-06-30 |
3 months | crt.sh |
*.gyazo.com RapidSSL RSA CA 2018 |
2019-03-27 - 2021-05-08 |
2 years | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-04-07 - 2020-06-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://count.mail.163.com.jzipqsut.com/Order_Docs.xls.html
Frame ID: 12D83D894BEDCC4D72993C4FD144DCAC
Requests: 6 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Order_Docs.xls.html
count.mail.163.com.jzipqsut.com/ |
18 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 645 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
7fc7a0126fd7e7c8bcb89fc52967c8ec.png
i.gyazo.com/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
049bc4624875e35c9a678af7eb99bb95.jpg
i.gyazo.com/ |
48 KB 48 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jizfRExUiTo99u79B_mh0O6tLR8a8zI.woff2
fonts.gstatic.com/s/ptsans/v11/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jizaRExUiTo99u79D0KExcOPIDU.woff2
fonts.gstatic.com/s/ptsans/v11/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Excel / PDF download (Online)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
count.mail.163.com.jzipqsut.com
fonts.googleapis.com
fonts.gstatic.com
i.gyazo.com
111.90.141.6
2606:4700:1::6813:8f6f
2a00:1450:4001:817::200a
2a00:1450:4001:820::2003
34401e82a1141472df1697a141aa50812c17e6138424ca4caba5f3fc69885f4a
4e8ae2b5e4ce9048e1cddad28de81806e0ca3847564121d3f8884f9befc5ef0e
80ba57dc7db83efdd7a57527174a7e91b4a22a413b7939da63565fafa8243292
9ae1e27e08b4bbc15557c0f5bbd97b4009eb86c85da9fb2be4c4085a5289182f
a2e5407241ad7b446193f5b24172cfea924d52e366a3e21eee1e53597db06914
bb74816a9aaed49f7b58ffbfead623f50686271a551d77a3ed95a56a56e40dbf