www.connect.auone.co.jp.akunto-kddi.com
Open in
urlscan Pro
162.241.201.239
Malicious Activity!
Public Scan
Submission Tags: phishtake
Submission: On January 09 via api from JP
Summary
This is the only time www.connect.auone.co.jp.akunto-kddi.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: KDDI Au (Telecommunication) au ID (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 162.241.201.239 162.241.201.239 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
15 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-201-239.unifiedlayer.com
www.connect.auone.co.jp.akunto-kddi.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
akunto-kddi.com
www.connect.auone.co.jp.akunto-kddi.com |
161 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | www.connect.auone.co.jp.akunto-kddi.com |
www.connect.auone.co.jp.akunto-kddi.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.connect.auone.co.jp.akunto-kddi.com/login.php
Frame ID: 698FF1CE049FD59C361931A728C6D205
Requests: 16 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login.php
www.connect.auone.co.jp.akunto-kddi.com/ |
10 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lgContentsIos.css
www.connect.auone.co.jp.akunto-kddi.com/resources/style/common/android2/ |
57 KB 57 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
memberSp.css
www.connect.auone.co.jp.akunto-kddi.com/resources/style/common/android2/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
seqcommon.css
www.connect.auone.co.jp.akunto-kddi.com/resources/style/common/android2/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttonCommon.css
www.connect.auone.co.jp.akunto-kddi.com/resources/style/ |
3 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
buttonIos.css
www.connect.auone.co.jp.akunto-kddi.com/resources/style/common/android2/ |
388 B 629 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
androidPortrait.css
www.connect.auone.co.jp.akunto-kddi.com/resources/style/common/android2/ |
596 B 837 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.css
www.connect.auone.co.jp.akunto-kddi.com/login_contents/resources/style/ |
6 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
android_ipad_96.png
www.connect.auone.co.jp.akunto-kddi.com/login_contents/resources/image/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.3.1.min.js
www.connect.auone.co.jp.akunto-kddi.com/resources/js/jQuery/ |
54 KB 54 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.js
www.connect.auone.co.jp.akunto-kddi.com/login_contents/resources/js/ |
28 B 281 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ioslogin.js
www.connect.auone.co.jp.akunto-kddi.com/resources/js/common/android2/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginpasswd.js
www.connect.auone.co.jp.akunto-kddi.com/resources/js/common/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
trfunction.js
www.connect.auone.co.jp.akunto-kddi.com/resources/js/common/ |
653 B 907 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_auid.png
www.connect.auone.co.jp.akunto-kddi.com/login_contents/resources/image/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: KDDI Au (Telecommunication) au ID (Telecommunication)23 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery string| cpslkmsg string| tr_pageid function| trMainmenu function| trSpassRecommend function| trTimeLine function| trBulletinBoard function| trInfomation function| trMenuList function| trExitLink function| trSideMenu function| trSpassService function| trIntroduction function| trResign function| trEvent function| generatePV function| trEventBeID1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.connect.auone.co.jp.akunto-kddi.com/ | Name: PHPSESSID Value: 17dc83e0050e23308e416c01cf150362 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.connect.auone.co.jp.akunto-kddi.com
162.241.201.239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