bk.mufg.jp.sekegu.bar
Open in
urlscan Pro
198.176.61.10
Malicious Activity!
Public Scan
Effective URL: https://bk.mufg.jp.sekegu.bar/
Submission: On February 26 via manual from JP
Summary
TLS certificate: Issued by TrustAsia TLS RSA CA on February 26th 2021. Valid for: a year.
This is the only time bk.mufg.jp.sekegu.bar was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: MUFG (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 12 | 198.176.61.10 198.176.61.10 | 21859 (ZNET) (ZNET) | |
12 | 2 |
ASN21859 (ZNET, US)
PTR: 198.176.61.10.static.klayer.com
bk.mufg.jp.sekegu.bar |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
sekegu.bar
1 redirects
bk.mufg.jp.sekegu.bar |
1 MB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | bk.mufg.jp.sekegu.bar |
1 redirects
bk.mufg.jp.sekegu.bar
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bk.mufg.jp.sekegu.bar TrustAsia TLS RSA CA |
2021-02-26 - 2022-02-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bk.mufg.jp.sekegu.bar/
Frame ID: 8239956F7CD8A952ED1D24E24B47C11C
Requests: 18 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://bk.mufg.jp.sekegu.bar/
HTTP 301
https://bk.mufg.jp.sekegu.bar/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bk.mufg.jp.sekegu.bar/
HTTP 301
https://bk.mufg.jp.sekegu.bar/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bk.mufg.jp.sekegu.bar/ Redirect Chain
|
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.ca88fbcd.chunk.css
bk.mufg.jp.sekegu.bar/static/css/ |
558 KB 86 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.40181049.chunk.css
bk.mufg.jp.sekegu.bar/static/css/ |
804 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.7f8ad05e.chunk.js
bk.mufg.jp.sekegu.bar/static/js/ |
390 KB 140 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.0e6aac95.chunk.js
bk.mufg.jp.sekegu.bar/static/js/ |
114 KB 55 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
bk.mufg.jp.sekegu.bar/socket.io/ |
96 B 264 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
home_bg.4543e08c.png
bk.mufg.jp.sekegu.bar/static/media/ |
951 KB 952 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
867 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img_cashcard.b3885fd9.png
bk.mufg.jp.sekegu.bar/static/media/ |
76 KB 76 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
8 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img_bango.bc920aac.png
bk.mufg.jp.sekegu.bar/static/media/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
/
bk.mufg.jp.sekegu.bar/socket.io/ |
2 B 189 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
bk.mufg.jp.sekegu.bar/socket.io/ |
32 B 200 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
bk.mufg.jp.sekegu.bar/socket.io/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- bk.mufg.jp.sekegu.bar
- URL
- https://bk.mufg.jp.sekegu.bar/socket.io/?EIO=4&transport=polling&t=NVWgLcN&sid=3hPpZo-5jV85AcrsAABY
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: MUFG (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bk.mufg.jp.sekegu.bar
bk.mufg.jp.sekegu.bar
198.176.61.10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