oiuasbfas.jungleheart.com
Open in
urlscan Pro
155.94.134.111
Malicious Activity!
Public Scan
Effective URL: https://oiuasbfas.jungleheart.com/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scope=openid&_gl=1*1li7p...
Submission: On March 07 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by R3 on March 6th 2023. Valid for: 3 months.
This is the only time oiuasbfas.jungleheart.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Softbank (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 104.21.39.221 104.21.39.221 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 15 | 155.94.134.111 155.94.134.111 | 64270 (PACIFICRACK) (PACIFICRACK) | |
2 | 184.26.241.212 184.26.241.212 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 221.194.141.170 221.194.141.170 | () () | |
21 | 5 |
ASN64270 (PACIFICRACK, US)
PTR: 155.94.134.111.static.quadranet.com
oiuasbfas.jungleheart.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a184-26-241-212.deploy.static.akamaitechnologies.com
cdn.softbank.jp |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
jungleheart.com
1 redirects
oiuasbfas.jungleheart.com |
322 KB |
2 |
softbank.jp
cdn.softbank.jp |
8 KB |
1 |
bootcdn.net
cdn.bootcdn.net Failed |
4 KB |
1 |
workers.dev
quiet-snowflake-ad72.hxo9jax9.workers.dev |
542 B |
21 | 4 |
Domain | Requested by | |
---|---|---|
15 | oiuasbfas.jungleheart.com |
1 redirects
quiet-snowflake-ad72.hxo9jax9.workers.dev
oiuasbfas.jungleheart.com |
2 | cdn.softbank.jp |
oiuasbfas.jungleheart.com
|
1 | cdn.bootcdn.net |
oiuasbfas.jungleheart.com
|
1 | quiet-snowflake-ad72.hxo9jax9.workers.dev | |
21 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.hxo9jax9.workers.dev GTS CA 1P5 |
2023-03-05 - 2023-06-03 |
3 months | crt.sh |
uibgkasdf.yourtrap.com R3 |
2023-03-06 - 2023-06-04 |
3 months | crt.sh |
cdn.softbank.jp Cybertrust Japan SureServer EV CA G3 |
2022-05-30 - 2023-05-30 |
a year | crt.sh |
cdn.bootcdn.net TrustAsia RSA DV TLS CA G2 |
2022-06-06 - 2023-06-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://oiuasbfas.jungleheart.com/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scope=openid&_gl=1*1li7pmi*_ga*MTc0NjIwMTE2Ni4xNjY5MzY5MDg0*_ga_BKKP87CX6T*MTY3NzE1NDEyNC4xLjAuMTY3NzE1NDEyNi41OC4wLjA
Frame ID: BADE758782C756E50FDF763BA73846B9
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://quiet-snowflake-ad72.hxo9jax9.workers.dev/ Page URL
-
https://oiuasbfas.jungleheart.com/
HTTP 302
https://oiuasbfas.jungleheart.com/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scop... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Mautic (Marketing Automation) Expand
Detected patterns
- [^a-z]mtc.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://quiet-snowflake-ad72.hxo9jax9.workers.dev/ Page URL
-
https://oiuasbfas.jungleheart.com/
HTTP 302
https://oiuasbfas.jungleheart.com/login.php?screen/na/authorize?response_type=code&client_id=ZC001&state=&scope=openid&_gl=1*1li7pmi*_ga*MTc0NjIwMTE2Ni4xNjY5MzY5MDg0*_ga_BKKP87CX6T*MTY3NzE1NDEyNC4xLjAuMTY3NzE1NDEyNi41OC4wLjA Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
quiet-snowflake-ad72.hxo9jax9.workers.dev/ |
74 B 542 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
login.php
oiuasbfas.jungleheart.com/ Redirect Chain
|
14 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
oiuasbfas.jungleheart.com/css/ |
570 KB 51 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
oiuasbfas.jungleheart.com/js/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-common.css
oiuasbfas.jungleheart.com/css/ |
26 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mysb-temporary.css
oiuasbfas.jungleheart.com/css/ |
16 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notice_pcidss_y_tls.css
oiuasbfas.jungleheart.com/css/ |
940 B 469 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
oiuasbfas.jungleheart.com/css/ |
284 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validate_sbid_auth.js
cdn.softbank.jp/mysoftbank/set/data/add/casis/11/js/shared/ |
20 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-jquery.min.js
oiuasbfas.jungleheart.com/admin/im/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layui.js
oiuasbfas.jungleheart.com/admin/im/ |
284 KB 92 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-header-mysb.png
oiuasbfas.jungleheart.com/css/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
site-logo.png
oiuasbfas.jungleheart.com/css/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switch_blind.png
cdn.softbank.jp/mysoftbank/set/data/add/casis/11/img/shared/ |
261 B 562 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
laydate.css
oiuasbfas.jungleheart.com/css/css/modules/laydate/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.css
oiuasbfas.jungleheart.com/css/css/modules/layer/default/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
code.css
oiuasbfas.jungleheart.com/css/css/modules/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
layer.min.css
cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/ |
13 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
api.php
oiuasbfas.jungleheart.com/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
bg_switch_blind.png
oiuasbfas.jungleheart.com/img/shared/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- cdn.bootcdn.net
- URL
- https://cdn.bootcdn.net/ajax/libs/layer/3.5.1/theme/default/layer.min.css
- Domain
- oiuasbfas.jungleheart.com
- URL
- https://oiuasbfas.jungleheart.com/api.php?act=ip_save&_r=0.6508360549052188
- Domain
- oiuasbfas.jungleheart.com
- URL
- https://oiuasbfas.jungleheart.com/img/shared/bg_switch_blind.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Softbank (Telecommunication)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery object| layui function| lay number| errors object| layer object| jQuery11010276168967329823541 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
oiuasbfas.jungleheart.com/ | Name: PHPSESSID Value: j2he61acqrn44rvikstii5sbdp |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.bootcdn.net
cdn.softbank.jp
oiuasbfas.jungleheart.com
quiet-snowflake-ad72.hxo9jax9.workers.dev
cdn.bootcdn.net
oiuasbfas.jungleheart.com
104.21.39.221
155.94.134.111
184.26.241.212
221.194.141.170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