rld.aupay.me
Open in
urlscan Pro
137.220.232.159
Malicious Activity!
Public Scan
Effective URL: https://rld.aupay.me/Template/ID/
Submission Tags: phishing au Search All
Submission: On November 26 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on November 25th 2021. Valid for: a year.
This is the only time rld.aupay.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: au ID (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 137.220.232.159 137.220.232.159 | 64050 (BCPL-SG B...) (BCPL-SG BGPNET Global ASN) | |
4 | 111.87.221.81 111.87.221.81 | 2516 (KDDI KDDI...) (KDDI KDDI CORPORATION) | |
5 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
auone.jp
connect.auone.jp |
46 KB |
2 |
aupay.me
1 redirects
rld.aupay.me |
5 KB |
5 | 2 |
Domain | Requested by | |
---|---|---|
4 | connect.auone.jp |
rld.aupay.me
|
2 | rld.aupay.me | 1 redirects |
5 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.aupay.me Sectigo RSA Domain Validation Secure Server CA |
2021-11-25 - 2022-11-25 |
a year | crt.sh |
connect.auone.jp GlobalSign RSA OV SSL CA 2018 |
2021-02-26 - 2022-03-30 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://rld.aupay.me/Template/ID/
Frame ID: 6702195B85D06BA0AA9ECD7E72E99C3A
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
au IDログインPage URL History Show full URLs
-
https://rld.aupay.me/
HTTP 302
https://rld.aupay.me/Template/ID/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rld.aupay.me/
HTTP 302
https://rld.aupay.me/Template/ID/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
rld.aupay.me/Template/ID/ Redirect Chain
|
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
androidPortrait.css
connect.auone.jp/net/vwc/cca_lg_eu_nets/resources/style/common/android2/ |
860 B 939 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
idk.css
connect.auone.jp/net/vwc/cca_lg_eu_nets/resources/style/common/ |
45 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkboxRadio.css
connect.auone.jp/net/vwc/cca_lg_eu_nets/resources/style/common/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
au_id.jpg
connect.auone.jp/net/vwc/cca_lg_eu_nets/resources/image/common/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: au ID (Telecommunication)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
rld.aupay.me/ | Name: ASPSESSIONIDQEQTDRSC Value: CIMKNGBAKNANCMIEKPPCGIPL |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
connect.auone.jp
rld.aupay.me
111.87.221.81
137.220.232.159
1ec5abc3e4e21e84224089afccec3c1677323ec02fe04f2bbf6083a9b9d3fc2d
703e3a52e0defa4b3db84e69dc3cb7c2cd3d5b8ca6e6b9ccff104687c310b676
94ba57c52e04f3c35b9e76390f17a2d063ae6c6c34f447f7412ec32a233b7abd
a63fd3959f8cd89c2706cb778dea2994b82cfc800bf5db9257edcf1fa7222b80
e5bc05f0210c26f438b58a4ff0a58f90c62bca2671b58f7c9fb3ed8082f69564