esterx.ga
Open in
urlscan Pro
210.16.102.206
Malicious Activity!
Public Scan
Submission: On April 18 via api from CA
Summary
This is the only time esterx.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chunghwa Telecom (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
24 | 210.16.102.206 210.16.102.206 | 40676 (AS40676) (AS40676 - Psychz Networks) | |
25 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
24 |
esterx.ga
esterx.ga |
485 KB |
0 |
hinet.net
Failed
p8u.hinet.net Failed |
|
25 | 2 |
Domain | Requested by | |
---|---|---|
24 | esterx.ga |
esterx.ga
|
0 | p8u.hinet.net Failed |
esterx.ga
|
25 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://esterx.ga/update./
Frame ID: ADFBC584CE67358E084A87C117B0A2D1
Requests: 20 HTTP requests in this frame
Frame:
http://esterx.ga/update./files/top.html
Frame ID: BD032FFF932CECD00E87E1A3D11729B9
Requests: 5 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui(?:-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
25 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
esterx.ga/update./ |
20 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
esterx.ga/update./files/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keyboardstyle.css
esterx.ga/update./files/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
esterx.ga/update./files/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
esterx.ga/update./files/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui-1.10.3.custom.min.js
esterx.ga/update./files/ |
223 KB 223 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-fieldselection.js
esterx.ga/update./files/ |
3 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vkeyboard.js
esterx.ga/update./files/ |
6 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
esterx.ga/update./files/ |
18 KB 18 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.js
esterx.ga/update./files/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site=hinet&affiliate=webmail&spacedesc=webmail1440x1024&adsize=1440x1024&tile=6306603804&transactionID=6306603804
esterx.ga/update./files/ |
22 B 237 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site=hinet&affiliate=webmail&spacedesc=webmail660x520&adsize=660x520&tile=6306603804&transactionID=6306603804
esterx.ga/update./files/ |
470 B 686 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
18_660x520_01.jpg
esterx.ga/update./files/ |
89 KB 89 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
w_line.gif
esterx.ga/update./files/ |
52 B 292 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
keyboard.png
esterx.ga/update./files/ |
345 B 586 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
maillogin_07-1.gif
esterx.ga/update./files/ |
535 B 776 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dot_arr2_t.gif
esterx.ga/update./files/ |
59 B 299 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
himail_logo.gif
esterx.ga/update./files/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
close.jpg
esterx.ga/update./files/ |
923 B 1 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
top.html
esterx.ga/update./files/ Frame BD03 |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
site=hinet&affiliate=webmail&spacedesc=webmail1440x1024&adsize=1440x1024&tile=1311101462&transactionID=1311101462
p8u.hinet.net/js.ng/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wm2k-style.css
esterx.ga/update./files/ Frame BD03 |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hinet-logo.gif
esterx.ga/update./files/ Frame BD03 |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hinet-hd-t01.gif
esterx.ga/update./files/ Frame BD03 |
1 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
hinet-hd-t02.gif
esterx.ga/update./files/ Frame BD03 |
245 B 486 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- p8u.hinet.net
- URL
- https://p8u.hinet.net/js.ng/site=hinet&affiliate=webmail&spacedesc=webmail1440x1024&adsize=1440x1024&tile=1311101462&transactionID=1311101462
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chunghwa Telecom (Telecommunication)53 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask string| url function| $ function| jQuery function| shuffleRow function| shuffleKeyboard function| resetRow function| resetKeyboard function| onShift function| showKeyboard function| CloseModelPopup function| MM_preloadImages function| MM_swapImgRestore function| MM_findObj function| MM_swapImage boolean| onlyOne object| today object| expiry function| myTrim function| Trim function| checkCookieEnable function| validateEmail function| validateAccount function| resetTab function| checkTheSame function| checkMailID function| checkInput function| compile function| uncompile function| setCookie function| getCookie function| deleteCookie function| register function| changeTab function| checkCookie function| personalflashit function| businessflashit function| getErrMessage function| showMessageAndGetCookie function| switchSavePasswd function| switchSaveAccount number| tabName boolean| savePasswdFlag function| isChrome function| isIE function| getScrollXY function| getMyWidth function| myResize function| setScrollBar object| jQuery111002384734793963743 number| bust10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
esterx.ga
p8u.hinet.net
p8u.hinet.net
210.16.102.206
0a86c1f14c796b60817161ea2323a198daf312b0553628dc31601ba5b4d59888
10eecf80122ad437a3daa21d7f8deff99af7dd47964655b7e4ac0996362ee4cc
12e7215c53f14c434421e987b67c84b5887a670773f3407ff5b3eeaa4fde5c8d
156b810a7a41eaf929200786d5a6d124558079ff8e06f68cd6bab90bbb18e283
36c4bb08df2e7a6e3238fa19fcb8eb1f9ed9eaf02b46f467e6f59c02c2b22f43
4218e984328925e19ac475e1f61e2ec5f373fe2e7fcc3c96765f79acecb21d54
5f50346008b35f84e9215505750c68fccdf8ae6ccb1be410009923a625e464bf
60e5ac333b1ee5bfc1df9d9240d31b7be24882e50137e9b681d96999708427a0
6ab5bfb65965a9104bcc5c446e7ba5d16aa53a6ce3336c3cbf4ae355b6ee4cb1
6f6c3f1d57e7dccf9e1845a6b86d7015c873f9ff8bb46d302a8d923cb29940ad
7fd6687a6e1e06f30b83f38aad59e4cb385d960a3db8f4f6dfb5a43f056e9f59
80358ff9be39687d4022346716126defa959bf259dc279e4fa79c5a9e5d6266b
82cb94f86d902bbc6baa03bb73fd6c97f7e47e221a79278fb2862fcb49f70e6e
82cc1448d53752d24bb4d5cf39374ef114daf14c7e11bcd0c765708da9a2326f
ac0ac943017702ca0934831adffa93cd3e0a21d253f607a0c4ddc570b679828e
afb1ef623fb7cc98d5848f53cb0affeb7822e26c8ff4fe979d1f2491bfffdcc3
b294e973896f8f874e90a8eb1a8908ac790980d034c4c4bdf0fc3d37b8abf682
bd6845710f8b65925fdb00a1e448f0f7f8ac194cffd391946eb4ee561787eac4
c5cd3ae960d492688c750ca358bc69b3872e599f7ad8f505258a2f5ec4f6ae82
c7615d473078bcc779a9829ef9439094a50683e13bb242affa91852adcb528d3
c9c6e9cac38a41bbf2361ce5015d2dd4334307fca7271cadf1ac7e9a7a489269
d09a4f2a61f63ab0012dceac0ae76a0718363bbd1439eaea4dd37d13f1df02ce
f01ea88e32e6b1163203472998b1fb2f800ec24e5b7b7c7fd9cb4e008b4609a0
f181238f262b5cc5c4b78eb41510fb8102feac7dbcb6513b109ebe5d594c901d