Submitted URL: http://smjfotap.c4496.top/
Effective URL: http://bfgdtaav4.2waky.com/?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYeDBKME09&m=&t=&ip=58....
Submission Tags: phishing smbc jp financial Search All
Submission: On July 17 via api from JP — Scanned from JP

Summary

This website contacted 1 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 194.116.214.85, located in San Jose, United States and belongs to CLOUDBACKBONE, HK. The main domain is bfgdtaav4.2waky.com.
This is the only time bfgdtaav4.2waky.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 193.43.72.215 56971 (CLOUDBACK...)
1 194.116.214.85 56971 (CLOUDBACK...)
1 1
Apex Domain
Subdomains
Transfer
1 2waky.com
bfgdtaav4.2waky.com
1 KB
1 c4496.top
smjfotap.c4496.top
343 B
1 2
Domain Requested by
1 bfgdtaav4.2waky.com
1 smjfotap.c4496.top 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://bfgdtaav4.2waky.com/?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYeDBKME09&m=&t=&ip=58.94.82.96&language=jp-jp,jp;q=0.9&d=
Frame ID: 7629B787CD9E38B8B8F5E7C049ADA489
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

没有找到站点

Page URL History Show full URLs

  1. http://smjfotap.c4496.top/ HTTP 302
    http://bfgdtaav4.2waky.com/?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYe... Page URL

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://smjfotap.c4496.top/ HTTP 302
    http://bfgdtaav4.2waky.com/?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYeDBKME09&m=&t=&ip=58.94.82.96&language=jp-jp,jp;q=0.9&d= Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
bfgdtaav4.2waky.com/
Redirect Chain
  • http://smjfotap.c4496.top/
  • http://bfgdtaav4.2waky.com/?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYeDBKME09&m=&t=&ip=58.94.82.96&language=jp-jp,jp;q=0.9&d=
1 KB
1 KB
Document
General
Full URL
http://bfgdtaav4.2waky.com/?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYeDBKME09&m=&t=&ip=58.94.82.96&language=jp-jp,jp;q=0.9&d=
Protocol
HTTP/1.1
Server
194.116.214.85 San Jose, United States, ASN56971 (CLOUDBACKBONE, HK),
Reverse DNS
Software
Apache /
Resource Hash
cdf9d8eee8c4fe967fac3aa9218a7227647ae7aaaa4221c688e1aab7a9180f69

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/114.0.5735.198 Safari/537.36
accept-language
jp-jp,jp;q=0.9

Response headers

Accept-Ranges
bytes
Connection
Upgrade, close
Content-Encoding
gzip
Content-Length
766
Content-Type
text/html
Date
Mon, 17 Jul 2023 07:19:39 GMT
ETag
"52e-54e0d47a39ec0-gzip"
Last-Modified
Wed, 26 Apr 2017 08:03:47 GMT
Server
Apache
Upgrade
h2
Vary
Accept-Encoding

Redirect headers

Connection
Upgrade, close
Content-Length
0
Content-Type
text/html;charset=uft-8
Date
Mon, 17 Jul 2023 07:19:37 GMT
Location
http://bfgdtaav4.2waky.com?p=zUQh9vHK3wLFgGo7PcZmQmhyK2cyVUdHbU1vOEhZcWthcEtaS1ZBNVZHYUxNMzREM3UxNGNYeDBKME09&m=&t=&ip=58.94.82.96&language=jp-jp,jp;q=0.9&d=
Server
Apache
Upgrade
h2

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| onbeforetoggle object| onscrollend

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bfgdtaav4.2waky.com
smjfotap.c4496.top
193.43.72.215
194.116.214.85
cdf9d8eee8c4fe967fac3aa9218a7227647ae7aaaa4221c688e1aab7a9180f69