uzjgxl.cn
Open in
urlscan Pro
35.241.86.74
Malicious Activity!
Public Scan
Effective URL: https://uzjgxl.cn/login.php
Submission Tags: phishing etc service Search All
Submission: On December 18 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on December 10th 2022. Valid for: 3 months.
This is the only time uzjgxl.cn was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ETC (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:303... 2606:4700:3032::ac43:9557 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 4 | 35.241.86.74 35.241.86.74 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
1 | 34.150.46.113 34.150.46.113 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
5 | 4 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 74.86.241.35.bc.googleusercontent.com
uzjgxl.cn |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 113.46.150.34.bc.googleusercontent.com
www.aini1314.shop |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
uzjgxl.cn
1 redirects
uzjgxl.cn |
23 KB |
1 |
aini1314.shop
www.aini1314.shop |
355 B |
1 |
workers.dev
etc.cvsauvzo.workers.dev |
523 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
4 | uzjgxl.cn |
1 redirects
etc.cvsauvzo.workers.dev
uzjgxl.cn |
1 | www.aini1314.shop |
uzjgxl.cn
|
1 | etc.cvsauvzo.workers.dev | |
5 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.cvsauvzo.workers.dev E1 |
2022-12-18 - 2023-03-18 |
3 months | crt.sh |
uzjgxl.cn R3 |
2022-12-10 - 2023-03-10 |
3 months | crt.sh |
www.aini1314.shop R3 |
2022-11-29 - 2023-02-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://uzjgxl.cn/login.php
Frame ID: A906E469699C76B0D24BB4E611EC1996
Requests: 16 HTTP requests in this frame
Screenshot
Page Title
ETC利用照会サービスPage URL History Show full URLs
- https://etc.cvsauvzo.workers.dev/ Page URL
-
http://uzjgxl.cn/
HTTP 301
https://uzjgxl.cn/ Page URL
- https://uzjgxl.cn/login.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://etc.cvsauvzo.workers.dev/ Page URL
-
http://uzjgxl.cn/
HTTP 301
https://uzjgxl.cn/ Page URL
- https://uzjgxl.cn/login.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- http://uzjgxl.cn/ HTTP 301
- https://uzjgxl.cn/
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
etc.cvsauvzo.workers.dev/ |
56 B 523 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
uzjgxl.cn/ Redirect Chain
|
1 KB 771 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
uzjgxl.cn/js/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jump.php
www.aini1314.shop/api/ |
5 B 355 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
uzjgxl.cn/ |
54 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
392 B 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
904 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1020 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
77 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
86 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
223 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
378 B 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ETC (Transportation)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| savepage_ShadowLoader1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
uzjgxl.cn/ | Name: isuser Value: true |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
etc.cvsauvzo.workers.dev
uzjgxl.cn
www.aini1314.shop
2606:4700:3032::ac43:9557
34.150.46.113
35.241.86.74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