nttdocomo.top
Open in
urlscan Pro
180.215.9.68
Malicious Activity!
Public Scan
Summary
TLS certificate: Issued by R3 on June 20th 2021. Valid for: 3 months.
This is the only time nttdocomo.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: NTT Docomo (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 180.215.9.68 180.215.9.68 | 64050 (BCPL-SG B...) (BCPL-SG BGPNET Global ASN) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
nttdocomo.top
nttdocomo.top |
195 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | nttdocomo.top |
nttdocomo.top
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
nttdocomo.top R3 |
2021-06-20 - 2021-09-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://nttdocomo.top/
Frame ID: 8657F56272D9FC986F1083DB24AFA7DD
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
nttdocomo.top/ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.css
nttdocomo.top/assets/files/style/css/ |
78 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
normalize.css
nttdocomo.top/assets/files/style/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
nttdocomo.top/assets/files/style/css/ |
3 KB 1016 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
nttdocomo.top/assets/files/style/ |
284 KB 105 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
nttdocomo.top/assets/files/js/ |
94 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
nttdocomo.top/assets/files/style/css/modules/laydate/default/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
nttdocomo.top/assets/files/style/css/modules/layer/default/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
nttdocomo.top/assets/files/style/css/modules/ |
1 KB 722 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
iconfont.woff2
nttdocomo.top/assets/files/style/font/ |
25 KB 26 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: NTT Docomo (Telecommunication)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| layui function| lay number| errors object| layer object| jQuery112405814242087023862 function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
nttdocomo.top
180.215.9.68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