www.aiuopany.uslkl.club Open in urlscan Pro
193.53.127.165  Malicious Activity! Public Scan

URL: https://www.aiuopany.uslkl.club/login.php?token=
Submission: On October 25 via automatic, source openphish — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 193.53.127.165, located in Russian Federation and belongs to ASBAXETN, RU. The main domain is www.aiuopany.uslkl.club.
TLS certificate: Issued by R3 on October 23rd 2022. Valid for: 3 months.
This is the only time www.aiuopany.uslkl.club was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: au ID (Telecommunication)

Domain & IP information

IP Address AS Autonomous System
4 193.53.127.165 49392 (ASBAXETN)
4 1
Apex Domain
Subdomains
Transfer
4 uslkl.club
www.aiuopany.uslkl.club
49 KB
4 1
Domain Requested by
4 www.aiuopany.uslkl.club www.aiuopany.uslkl.club
4 1

This site contains links to these domains. Also see Links.

Domain
id.auone.jp
www.kddi.com
Subject Issuer Validity Valid
www.aiuopany.uslkl.club
R3
2022-10-23 -
2023-01-21
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.aiuopany.uslkl.club/login.php?token=
Frame ID: 6EBFF49E80499538C4E4BAAB85CE3CEA
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

au IDログイン

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

49 kB
Transfer

85 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
www.aiuopany.uslkl.club/
8 KB
3 KB
Document
General
Full URL
https://www.aiuopany.uslkl.club/login.php?token=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
193.53.127.165 , Russian Federation, ASN49392 (ASBAXETN, RU),
Reverse DNS
service.fasinixiaoribenguizi031.com
Software
nginx /
Resource Hash
d0889161bf5d19ba5e486b37f75125836dd9dab207669e51ba60920d4a26a5e8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

cache-control
no-store, no-cache, must-revalidate
content-encoding
gzip
content-type
text/html; charset=UTF-8
date
Tue, 25 Oct 2022 15:20:33 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
pragma
no-cache
server
nginx
strict-transport-security
max-age=31536000
vary
Accept-Encoding
androidPortrait.css
www.aiuopany.uslkl.club/login/
860 B
1 KB
Stylesheet
General
Full URL
https://www.aiuopany.uslkl.club/login/androidPortrait.css
Requested by
Host: www.aiuopany.uslkl.club
URL: https://www.aiuopany.uslkl.club/login.php?token=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
193.53.127.165 , Russian Federation, ASN49392 (ASBAXETN, RU),
Reverse DNS
service.fasinixiaoribenguizi031.com
Software
nginx /
Resource Hash
94ba57c52e04f3c35b9e76390f17a2d063ae6c6c34f447f7412ec32a233b7abd
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.aiuopany.uslkl.club/login.php?token=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36

Response headers

date
Tue, 25 Oct 2022 15:20:34 GMT
strict-transport-security
max-age=31536000
last-modified
Wed, 30 Mar 2022 08:56:28 GMT
server
nginx
etag
"62441b3c-35c"
content-type
text/css
cache-control
max-age=43200
accept-ranges
bytes
content-length
860
expires
Wed, 26 Oct 2022 03:20:34 GMT
idk.css
www.aiuopany.uslkl.club/login/
43 KB
11 KB
Stylesheet
General
Full URL
https://www.aiuopany.uslkl.club/login/idk.css
Requested by
Host: www.aiuopany.uslkl.club
URL: https://www.aiuopany.uslkl.club/login.php?token=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
193.53.127.165 , Russian Federation, ASN49392 (ASBAXETN, RU),
Reverse DNS
service.fasinixiaoribenguizi031.com
Software
nginx /
Resource Hash
6e24853bd77e76a9aa22a6862ba42237a971dfd53c2d8a7fb9c82e6090961465
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.aiuopany.uslkl.club/login.php?token=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36

Response headers

date
Tue, 25 Oct 2022 15:20:34 GMT
strict-transport-security
max-age=31536000
content-encoding
gzip
last-modified
Wed, 30 Mar 2022 08:56:28 GMT
server
nginx
etag
W/"62441b3c-ab84"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=43200
expires
Wed, 26 Oct 2022 03:20:34 GMT
au_id.jpg
www.aiuopany.uslkl.club/login/
34 KB
34 KB
Image
General
Full URL
https://www.aiuopany.uslkl.club/login/au_id.jpg
Requested by
Host: www.aiuopany.uslkl.club
URL: https://www.aiuopany.uslkl.club/login.php?token=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
193.53.127.165 , Russian Federation, ASN49392 (ASBAXETN, RU),
Reverse DNS
service.fasinixiaoribenguizi031.com
Software
nginx /
Resource Hash
1ec5abc3e4e21e84224089afccec3c1677323ec02fe04f2bbf6083a9b9d3fc2d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.aiuopany.uslkl.club/login.php?token=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.119 Safari/537.36

Response headers

date
Tue, 25 Oct 2022 15:20:34 GMT
strict-transport-security
max-age=31536000
last-modified
Wed, 30 Mar 2022 08:56:30 GMT
server
nginx
etag
"62441b3e-87da"
content-type
image/jpeg
cache-control
max-age=2592000
accept-ranges
bytes
content-length
34778
expires
Thu, 24 Nov 2022 15:20:34 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: au ID (Telecommunication)

18 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation string| ip string| it string| is_bool_msg function| showErr object| time number| m string| t function| save function| setOperateCode

1 Cookies

Domain/Path Name / Value
www.aiuopany.uslkl.club/ Name: PHPSESSID
Value: i3kqbtvrul29nbk0dlpk7gjvpn

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000