bzxmio.xyz
Open in
urlscan Pro
43.153.139.227
Malicious Activity!
Public Scan
Effective URL: https://bzxmio.xyz/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scope=openid&_gl=1*1li7p...
Submission: On January 08 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on January 6th 2024. Valid for: 3 months.
This is the only time bzxmio.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Softbank (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 43.163.209.44 43.163.209.44 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
1 17 | 43.153.139.227 43.153.139.227 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
1 | 45.43.48.196 45.43.48.196 | 21859 (ZEN-ECN) (ZEN-ECN) | |
2 | 2600:140b:1a0... 2600:140b:1a00:987::c15 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
19 | 3 |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
bhgxmiau.com |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
bzxmio.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
bzxmio.xyz
1 redirects
bzxmio.xyz |
322 KB |
2 |
softbank.jp
cdn.softbank.jp |
8 KB |
1 |
bootcdn.net
cdn.bootcdn.net — Cisco Umbrella Rank: 91208 |
3 KB |
1 |
bhgxmiau.com
1 redirects
bhgxmiau.com |
89 B |
19 | 4 |
Domain | Requested by | |
---|---|---|
17 | bzxmio.xyz |
1 redirects
bzxmio.xyz
|
2 | cdn.softbank.jp |
bzxmio.xyz
|
1 | cdn.bootcdn.net |
bzxmio.xyz
|
1 | bhgxmiau.com | 1 redirects |
19 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bzxmhw.xyz R3 |
2024-01-06 - 2024-04-05 |
3 months | crt.sh |
*.bootcss.com Sectigo RSA Domain Validation Secure Server CA |
2024-01-03 - 2025-02-02 |
a year | crt.sh |
cdn.softbank.jp Cybertrust Japan SureServer EV CA G3 |
2023-03-17 - 2024-03-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bzxmio.xyz/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scope=openid&_gl=1*1li7pmi*_ga*MTc0NjIwMTE2Ni4xNjY5MzY5MDg0*_ga_BKKP87CX6T*MTY3NzE1NDEyNC4xLjAuMTY3NzE1NDEyNi41OC4wLjA
Frame ID: E04819413C4277F31621453E35293D97
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
ログイン | My SoftBank | ソフトバンクPage URL History Show full URLs
-
https://bhgxmiau.com/
HTTP 302
https://bzxmio.xyz/ HTTP 302
https://bzxmio.xyz/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scop... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Mautic (Marketing Automation) Expand
Detected patterns
- [^a-z]mtc.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bhgxmiau.com/
HTTP 302
https://bzxmio.xyz/ HTTP 302
https://bzxmio.xyz/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scope=openid&_gl=1*1li7pmi*_ga*MTc0NjIwMTE2Ni4xNjY5MzY5MDg0*_ga_BKKP87CX6T*MTY3NzE1NDEyNC4xLjAuMTY3NzE1NDEyNi41OC4wLjA Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login.php
bzxmio.xyz/ Redirect Chain
|
14 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
bzxmio.xyz/css/ |
570 KB 51 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
bzxmio.xyz/js/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-common.css
bzxmio.xyz/css/ |
26 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-temporary.css
bzxmio.xyz/css/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notice_pcidss_y_tls.css
bzxmio.xyz/css/ |
940 B 468 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
bzxmio.xyz/css/ |
284 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
13 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validate_sbid_auth.js
cdn.softbank.jp/mysoftbank/set/data/add/casis/11/js/shared/ |
20 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
bzxmio.xyz/yanyuan/im/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
bzxmio.xyz/yanyuan/im/ |
284 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-header-mysb.png
bzxmio.xyz/css/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-logo.png
bzxmio.xyz/css/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switch_blind.png
cdn.softbank.jp/mysoftbank/set/data/add/casis/11/img/shared/ |
261 B 589 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
bzxmio.xyz/css/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
bzxmio.xyz/css/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
bzxmio.xyz/css/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.php
bzxmio.xyz/ |
13 B 84 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_switch_blind.png
bzxmio.xyz/img/shared/ |
257 B 257 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Softbank (Telecommunication)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| $ function| jQuery object| layui function| lay number| errors object| layer object| jQuery1101015087668928109332 object| jQuery11010270868895056803 object| mask object| timer object| hb_timer function| heart_beat function| ip_save function| verify1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bzxmio.xyz/ | Name: PHPSESSID Value: t5pmapfuebv7qofie2mtbs8iv4 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bhgxmiau.com
bzxmio.xyz
cdn.bootcdn.net
cdn.softbank.jp
2600:140b:1a00:987::c15
43.153.139.227
43.163.209.44
45.43.48.196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