almighty.sakura.ne.jp
Open in
urlscan Pro
202.181.97.55
Malicious Activity!
Public Scan
Effective URL: http://almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/eufua/gbf/?9x9z9e9y0
Submission: On January 11 via api from US
Summary
This is the only time almighty.sakura.ne.jp was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Scam (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 202.181.97.55 202.181.97.55 | 9370 (SAKURA-B ...) (SAKURA-B SAKURA Internet Inc.) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::200a | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
4 | 2a00:1450:400... 2a00:1450:4001:80b::2003 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
7 | 4 |
ASN9370 (SAKURA-B SAKURA Internet Inc., JP)
PTR: www245.sakura.ne.jp
almighty.sakura.ne.jp |
ASN15169 (GOOGLE - Google LLC, US)
fonts.googleapis.com |
ASN15169 (GOOGLE - Google LLC, US)
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
gstatic.com
fonts.gstatic.com |
38 KB |
2 |
sakura.ne.jp
almighty.sakura.ne.jp |
3 KB |
1 |
googleapis.com
fonts.googleapis.com |
1 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
4 | fonts.gstatic.com |
almighty.sakura.ne.jp
|
2 | almighty.sakura.ne.jp |
almighty.sakura.ne.jp
|
1 | fonts.googleapis.com |
almighty.sakura.ne.jp
|
7 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
smarttracker.pro |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/eufua/gbf/?9x9z9e9y0
Frame ID: 554A8B4AB0963B7259B9F3EAEEF6A833
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/saak/meyyn/?drive=h1055zmvgwkhx5xz Page URL
- http://almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/eufua/gbf/?9x9z9e9y0 Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Major
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/saak/meyyn/?drive=h1055zmvgwkhx5xz Page URL
- http://almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/eufua/gbf/?9x9z9e9y0 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/saak/meyyn/ |
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
almighty.sakura.ne.jp/nikki4/2003/showgoods/attachments.php/eufua/gbf/ |
741 KB 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
fonts.googleapis.com/ |
10 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mem5YaGs126MiZpBA-UN7rgOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
z7NFdQDnbTkabZAIOl9il_O6KJj73e7Ff0GmDuXMR7eS2Ao.woff2
fonts.gstatic.com/s/opensanscondensed/v14/ |
10 KB 10 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mem5YaGs126MiZpBA-UNirkOUuhpKKSTjw.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
126 KB 0 |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
175 KB 0 |
Image
image/jpg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Scam (Online)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| today0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
almighty.sakura.ne.jp
fonts.googleapis.com
fonts.gstatic.com
202.181.97.55
2a00:1450:4001:80b::2003
2a00:1450:4001:819::200a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