bakkejonas.github.io
Open in
urlscan Pro
2606:50c0:8000::153
Malicious Activity!
Public Scan
Effective URL: https://bakkejonas.github.io/asia/
Submission: On September 07 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by DigiCert Global G2 TLS RSA SHA256 202... on March 15th 2024. Valid for: a year.
This is the only time bakkejonas.github.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: 163.cn (Online) Generic China (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:50c0:800... 2606:50c0:8000::153 | 54113 (FASTLY) (FASTLY) | |
5 | 103.129.252.61 103.129.252.61 | 137263 (NETEASE-A...) (NETEASE-AS-AP NETEASE HONG KONG LIMITED) | |
3 | 103.129.255.237 103.129.255.237 | 137263 (NETEASE-A...) (NETEASE-AS-AP NETEASE HONG KONG LIMITED) | |
1 | 103.129.255.181 103.129.255.181 | 137263 (NETEASE-A...) (NETEASE-AS-AP NETEASE HONG KONG LIMITED) | |
1 | 220.197.30.201 220.197.30.201 | 4837 (CHINA169-...) (CHINA169-BACKBONE CHINA UNICOM China169 Backbone) | |
14 | 6 |
ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK)
PTR: mail-m255237.qiye.163.com
mimg.qiye.163.com |
ASN137263 (NETEASE-AS-AP NETEASE HONG KONG LIMITED, HK)
mail.qiye.163.com |
ASN4837 (CHINA169-BACKBONE CHINA UNICOM China169 Backbone, CN)
PTR: m30201.mail.163.com
ssl.mail.163.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
127.net
mimg.127.net — Cisco Umbrella Rank: 127352 |
26 KB |
5 |
163.com
ir.mail.163.com Failed mimg.qiye.163.com mail.qiye.163.com — Cisco Umbrella Rank: 547141 ssl.mail.163.com — Cisco Umbrella Rank: 264973 |
226 KB |
2 |
github.io
bakkejonas.github.io |
4 KB |
14 | 3 |
Domain | Requested by | |
---|---|---|
5 | mimg.127.net |
bakkejonas.github.io
|
3 | mimg.qiye.163.com |
bakkejonas.github.io
|
2 | bakkejonas.github.io |
bakkejonas.github.io
|
1 | ssl.mail.163.com |
bakkejonas.github.io
|
1 | mail.qiye.163.com |
bakkejonas.github.io
|
0 | ir.mail.163.com Failed |
bakkejonas.github.io
|
14 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
mail.qiye.163.com |
mail.163.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.github.io DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-03-15 - 2025-03-14 |
a year | crt.sh |
mimg.127.net GeoTrust G2 TLS CN RSA4096 SHA256 2022 CA1 |
2024-08-20 - 2025-09-14 |
a year | crt.sh |
*.qiye.163.com GeoTrust RSA CN CA G2 |
2024-01-26 - 2025-02-23 |
a year | crt.sh |
*.mail.163.com GeoTrust G2 TLS CN RSA4096 SHA256 2022 CA1 |
2024-08-23 - 2025-09-22 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bakkejonas.github.io/asia/
Frame ID: E1FA806851451FEEAF30A4EC9135A7EF
Requests: 20 HTTP requests in this frame
Screenshot
Page Title
网易企业邮箱 - 登录入口Page URL History Show full URLs
-
http://bakkejonas.github.io/asia/
HTTP 307
https://bakkejonas.github.io/asia/ Page URL
Detected technologies
GitHub Pages (CDN) ExpandDetected patterns
- ^https?://[^/]+\.github\.io
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: 忘记密码
Search URL Search Domain Scan URL
Title: 网易邮箱大师
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bakkejonas.github.io/asia/
HTTP 307
https://bakkejonas.github.io/asia/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bakkejonas.github.io/asia/ Redirect Chain
|
14 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
get.do
ir.mail.163.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
get.do
ir.mail.163.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
base_v3.js
mimg.127.net/index/lib/scripts/ |
23 KB 7 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
qiye_algorithm.js
mimg.qiye.163.com/o/index/lib/scripts/ |
27 KB 9 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
raven-3.27.0.min.js
mimg.127.net/p/freemail/lib/track/ |
37 KB 14 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.243ddacd.css
mimg.qiye.163.com/o/mailapp/qiyelogin/css/ |
41 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
getqrcode.do
mail.qiye.163.com/mailapp/commonweb/qrcode/ |
8 KB 8 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
year.js
mimg.127.net/copyright/ |
24 B 217 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
knet.png
mimg.127.net/logo/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
httpsEnable.gif
ssl.mail.163.com/ |
43 B 224 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
bakkejonas.github.io/asia/ |
14 KB 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
raven-3.27.0.min.js
mimg.127.net/p/freemail/lib/track/ |
0 0 |
Other
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
promPic_190930.jpg
mimg.qiye.163.com/xm/qiye/img/ |
184 KB 184 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
588 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
461 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
341 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
163 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ir.mail.163.com
- URL
- https://ir.mail.163.com/get.do?prod=qiyeMail&mod=4&_time=1569617144148&callback=jsonp_8xm8znxmkr7jxda
- Domain
- ir.mail.163.com
- URL
- https://ir.mail.163.com/get.do?prod=qiyeMail&mod=4&_time=1569617144126&callback=jsonp_tp2760obz7qy0g0
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: 163.cn (Online) Generic China (Online)122 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| fCheckLoginNow function| fCheckAutoLogin function| fAutoLogin object| oAndroidRedirect function| fCheckBrowser function| fHtml5Tag function| fCheckCookie function| fGetQuery function| fGetQueryHash function| $id function| fTrim function| fParseMNum function| fCheckAccount function| fGetScript function| fGetCookie function| fSetCookie function| fEventListen function| fEventUnlisten function| fRandom function| fUrlP function| fResize function| fFQ function| fStartTime object| gUserInfo object| gVisitorCookie object| gMobileNumMail function| fEnData function| loginRequest function| getRnd function| DOMREADY string| base64EncodeChars function| base64encode function| utf16to8 function| fGetLocator function| fSetGadIndex function| MobCallback object| gIndexAd string| b64map string| b64pad function| hex2b64 function| b64tohex function| b64toBA number| dbits number| canary boolean| j_lm function| BigInteger function| nbi function| am1 function| am2 function| am3 number| BI_FP string| BI_RM object| BI_RC number| rr number| vv function| int2char function| intAt function| bnpCopyTo function| bnpFromInt function| nbv function| bnpFromString function| bnpClamp function| bnToString function| bnNegate function| bnAbs function| bnCompareTo function| nbits function| bnBitLength function| bnpDLShiftTo function| bnpDRShiftTo function| bnpLShiftTo function| bnpRShiftTo function| bnpSubTo function| bnpMultiplyTo function| bnpSquareTo function| bnpDivRemTo function| bnMod function| Classic function| cConvert function| cRevert function| cReduce function| cMulTo function| cSqrTo function| bnpInvDigit function| Montgomery function| montConvert function| montRevert function| montReduce function| montSqrTo function| montMulTo function| bnpIsEven function| bnpExp function| bnModPowInt function| Arcfour function| ARC4init function| ARC4next function| prng_newstate number| rng_psize object| rng_pool number| rng_pptr function| rng_seed_int function| rng_seed_time number| t function| rng_get_byte function| rng_get_bytes function| SecureRandom function| parseBigInt function| linebrk function| byte2Hex function| pkcs1pad2 function| RSAKey function| RSASetPublic function| RSADoPublic function| RSAEncrypt function| add function| MD5hex function| R1 function| R2 function| R3 function| R4 function| MD5 object| Raven1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mail.qiye.163.com/ | Name: qrcode_uuid Value: a4d5a126d5784aeaae214565a2a39c9d |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556952 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bakkejonas.github.io
ir.mail.163.com
mail.qiye.163.com
mimg.127.net
mimg.qiye.163.com
ssl.mail.163.com
ir.mail.163.com
103.129.252.61
103.129.255.181
103.129.255.237
220.197.30.201
2606:50c0:8000::153
17add961a686edb5b25996bcc4e08a14e5e36b6a1796ffbbb9cc751e7ca97ac8
3eae42b04633243211d610e94c6a97b6013be198a1dacef9ecf1791757a1bb99
4e0705327480ad2323cb03d9c450ffcae4a98bf3a5382fa0c7882145ed620e49
60475ffd41d476cab4bbe6c9b06358f2419e43ca09f51061df33f0dba9f66462
6dc89bf0a893d2b0cbe97ad18f7023ff7cbb1ed76145104ca1335cba465294be
78f95deba1d88e2fd1d8b43399c447f6eb336943374983cb83f4de4a97453c72
80089ae647f586811a97b726d1a96d4bc8655792ee2c7c735c42755e3d89822a
82001c8289b25dbf37dc7f186367be8e5b7aeecfb1300882787634ea30043402
8b6d98b0cf87dc28a33bbd54f6e64114b0b8417e654b82111fd0579e7efdbdbf
92bded93a6be187282a3acbb72a66b616d395d9d4f164b87c179f0482c2fa00f
a0ceb7edc5991f85a9613588811fee01502816f4a31ed92b19b348c07854f052
a3c947f7fb9fe61ef5891883b997f2289d7b8281f889fc5da6271c37e1bbfd01
b5bc31d50ab10af7839123055a82db0e619441dff28c2d02664432f6c481f802
c948a51709e4f0bd4c7f0b6f21ed55286524e2b6c74efdb1969473cb40deccde
da1765e31f0052026c93f62862b8dc9c1b2cc230dd13b0d4309a359955d01cd3
e17d22813188d9ade4f1f3e3d2712382664e6f1a70ff3fa79574d583f8a3f5a7
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855