suptest.eco-002.mediawars.net Open in urlscan Pro
210.233.72.4  Malicious Activity! Public Scan

URL: http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
Submission: On November 29 via automatic, source phishtank — Scanned from JP

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 210.233.72.4, located in Japan and belongs to MEDIAWARS MEDIAWARS co.,ltd., JP. The main domain is suptest.eco-002.mediawars.net.
This is the only time suptest.eco-002.mediawars.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Postmaster (Online)

Domain & IP information

IP Address AS Autonomous System
3 210.233.72.4 9353 (MEDIAWARS...)
3 1
Apex Domain
Subdomains
Transfer
3 mediawars.net
suptest.eco-002.mediawars.net
51 KB
3 1
Domain Requested by
3 suptest.eco-002.mediawars.net suptest.eco-002.mediawars.net
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
Frame ID: 54B54829BB391DA9650C501C11E7781B
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

邮箱更新设置

Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

51 kB
Transfer

50 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
suptest.eco-002.mediawars.net/cvg/jrl/china/
4 KB
4 KB
Document
General
Full URL
http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
Protocol
HTTP/1.1
Server
210.233.72.4 , Japan, ASN9353 (MEDIAWARS MEDIAWARS co.,ltd., JP),
Reverse DNS
eco-002.mediawars.net
Software
Apache / PHP/7.3.6
Resource Hash
c9c78036782c587b5d4292827a65955e9379c205366b263eb06225f54e43c1e2
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36
Accept-Language
jp-JP,jp;q=0.9

Response headers

Date
Mon, 29 Nov 2021 10:17:16 GMT
Server
Apache
X-Powered-By
PHP/7.3.6
X-Content-Type-Options
nosniff
X-Frame-Options
SAMEORIGIN
X-XSS-Protection
1; mode=block
Keep-Alive
timeout=15, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html
postmaster.png
suptest.eco-002.mediawars.net/cvg/jrl/china/hellion/
5 KB
6 KB
Image
General
Full URL
http://suptest.eco-002.mediawars.net/cvg/jrl/china/hellion/postmaster.png
Requested by
Host: suptest.eco-002.mediawars.net
URL: http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
Protocol
HTTP/1.1
Server
210.233.72.4 , Japan, ASN9353 (MEDIAWARS MEDIAWARS co.,ltd., JP),
Reverse DNS
eco-002.mediawars.net
Software
Apache /
Resource Hash
9241453e99644ed913735907d62b2ce5c6ef51c18f0780e95857fc345ba511d3
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
jp-JP,jp;q=0.9
Referer
http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Mon, 29 Nov 2021 10:17:16 GMT
X-Content-Type-Options
nosniff
Last-Modified
Fri, 26 Nov 2021 00:43:50 GMT
Server
Apache
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=99
Content-Length
5496
X-XSS-Protection
1; mode=block
logos.png
suptest.eco-002.mediawars.net/cvg/jrl/china/hellion/
41 KB
41 KB
Image
General
Full URL
http://suptest.eco-002.mediawars.net/cvg/jrl/china/hellion/logos.png
Requested by
Host: suptest.eco-002.mediawars.net
URL: http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
Protocol
HTTP/1.1
Server
210.233.72.4 , Japan, ASN9353 (MEDIAWARS MEDIAWARS co.,ltd., JP),
Reverse DNS
eco-002.mediawars.net
Software
Apache /
Resource Hash
59d7f74e29500e39832625a29b47a6d709703193ca0ad5c537118ae8712a8ac4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
jp-JP,jp;q=0.9
Referer
http://suptest.eco-002.mediawars.net/cvg/jrl/china/?login=info@yuanda-glass.com
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.45 Safari/537.36

Response headers

Date
Mon, 29 Nov 2021 10:17:16 GMT
X-Content-Type-Options
nosniff
Last-Modified
Fri, 26 Nov 2021 00:43:50 GMT
Server
Apache
X-Frame-Options
SAMEORIGIN
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=15, max=100
Content-Length
41796
X-XSS-Protection
1; mode=block

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Postmaster (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect function| reportError boolean| originAgentCluster object| scheduler

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

suptest.eco-002.mediawars.net
210.233.72.4
59d7f74e29500e39832625a29b47a6d709703193ca0ad5c537118ae8712a8ac4
9241453e99644ed913735907d62b2ce5c6ef51c18f0780e95857fc345ba511d3
c9c78036782c587b5d4292827a65955e9379c205366b263eb06225f54e43c1e2