Submitted URL: https://s.yam.com/KW5xq
Effective URL: http://www-yodoboshi-dfset-com.zvm.xyz/
Submission Tags: phishing yodobashi Search All
Submission: On September 28 via api from JP — Scanned from DE

Summary

This website contacted 1 IPs in 2 countries across 2 domains to perform 1 HTTP transactions. The main IP is 155.94.156.6, located in Los Angeles, United States and belongs to ASN-QUADRANET-GLOBAL, US. The main domain is www-yodoboshi-dfset-com.zvm.xyz.
This is the only time www-yodoboshi-dfset-com.zvm.xyz was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 52.187.123.178 8075 (MICROSOFT...)
1 155.94.156.6 8100 (ASN-QUADR...)
1 1
Apex Domain
Subdomains
Transfer
1 zvm.xyz
www-yodoboshi-dfset-com.zvm.xyz
416 B
1 yam.com
s.yam.com
300 B
1 2
Domain Requested by
1 www-yodoboshi-dfset-com.zvm.xyz
1 s.yam.com 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www-yodoboshi-dfset-com.zvm.xyz/
Frame ID: C049C913FBB1C444BB40C137E6C236B2
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

2
Countries

0 kB
Transfer

0 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
www-yodoboshi-dfset-com.zvm.xyz/
Redirect Chain
  • https://s.yam.com/KW5xq
  • http://www-yodoboshi-dfset-com.zvm.xyz/
0
416 B
Document
General
Full URL
http://www-yodoboshi-dfset-com.zvm.xyz/
Protocol
HTTP/1.1
Server
155.94.156.6 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL, US),
Reverse DNS
155.94.156.6.static.quadranet.com
Software
nginx /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Host
www-yodoboshi-dfset-com.zvm.xyz
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Server
nginx
Date
Tue, 28 Sep 2021 12:10:18 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Set-Cookie
PHPSESSID=oifpjfreub1bqo313btcecu3bb; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Content-Encoding
gzip

Redirect headers

Cache-Control
private
Content-Type
text/html; charset=utf-8
Location
http://www-yodoboshi-dfset-com.zvm.xyz/
Server
Microsoft-IIS/8.5
X-AspNetMvc-Version
5.2
X-AspNet-Version
4.0.30319
X-Powered-By
ASP.NET
Date
Tue, 28 Sep 2021 12:09:54 GMT
Content-Length
156

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster

1 Cookies

Domain/Path Name / Value
www-yodoboshi-dfset-com.zvm.xyz/ Name: PHPSESSID
Value: oifpjfreub1bqo313btcecu3bb

1 Console Messages

Source Level URL
Text
network error URL: http://www-yodoboshi-dfset-com.zvm.xyz/
Message:
Failed to load resource: the server responded with a status of 404 (Not Found)

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

s.yam.com
www-yodoboshi-dfset-com.zvm.xyz
155.94.156.6
52.187.123.178
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855