jassksa.com
Open in
urlscan Pro
192.185.29.139
Malicious Activity!
Public Scan
Effective URL: https://jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/
Submission: On March 02 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by R3 on January 15th 2022. Valid for: 3 months.
This is the only time jassksa.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Saudi Post (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:10:... 2606:4700:10::6816:e8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 2 | 34.196.20.94 34.196.20.94 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 1 | 54.83.52.76 54.83.52.76 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 22 | 192.185.29.139 192.185.29.139 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
21 | 1 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-196-20-94.compute-1.amazonaws.com
gotos.in |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-83-52-76.compute-1.amazonaws.com
bit.do |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 192-185-29-139.unifiedlayer.com
jassksa.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
22 |
jassksa.com
1 redirects
jassksa.com |
135 KB |
2 |
gotos.in
2 redirects
gotos.in |
1 KB |
1 |
bit.do
1 redirects
bit.do — Cisco Umbrella Rank: 182749 |
254 B |
1 |
cutt.ly
1 redirects
cutt.ly — Cisco Umbrella Rank: 65940 |
982 B |
21 | 4 |
Domain | Requested by | |
---|---|---|
22 | jassksa.com |
1 redirects
jassksa.com
|
2 | gotos.in | 2 redirects |
1 | bit.do | 1 redirects |
1 | cutt.ly | 1 redirects |
21 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paytabs.com |
mci.gov.sa |
Subject Issuer | Validity | Valid | |
---|---|---|---|
jassksa.com R3 |
2022-01-15 - 2022-04-15 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/
Frame ID: BCD57D76F5D554D2CAA17A0E88C44AC6
Requests: 21 HTTP requests in this frame
Screenshot
Page Title
PayTabs - Simple & Trusted PaymentsPage URL History Show full URLs
-
https://cutt.ly/CPYvMM2
HTTP 301
http://gotos.in/you+have+to+write+a+really+really+long+url+to+get+to+650+characters.+like+se... HTTP 301
https://gotos.in/you+have+to+write+a+really+really+long+url+to+get+to+650+characters.+like+se... HTTP 302
http://bit.do/fTyHt HTTP 301
https://jassksa.com/image/payment/panasia/bank-images/aven/ HTTP 302
https://jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Terms & Conditions
Search URL Search Domain Scan URL
Title: mci.gov.sa
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://cutt.ly/CPYvMM2
HTTP 301
http://gotos.in/you+have+to+write+a+really+really+long+url+to+get+to+650+characters.+like+seriously+you+have+no+idea+how+long+it+has+to+be+650+characters+is+absolutely+freaking+enormous.+You+can+fit+sooooooooooooooooooooooooooooooooo+much+data+into+650+characters.+My+hands+are+getting+tired+typing+this+many+characters.+I+didnt+even+realise+how+long+it+was+going+to+take+to+type+them+all.+So+many+characters.+I'm+bored+now+so+I'll+just+copy+and+paste.+I'm+bored+now+so+I'll+just+copy+and+paste+Rz+.I'm+bored+now+so+I'll+just+copy+and+paste.I'm+bored+now+so+I'll+just+copy+and+paste.I'm+bored+now+so+I'll+just+copy+and+paste.+It+has+to+be+freaking+enormously+freaking+enormous HTTP 301
https://gotos.in/you+have+to+write+a+really+really+long+url+to+get+to+650+characters.+like+seriously+you+have+no+idea+how+long+it+has+to+be+650+characters+is+absolutely+freaking+enormous.+You+can+fit+sooooooooooooooooooooooooooooooooo+much+data+into+650+characters.+My+hands+are+getting+tired+typing+this+many+characters.+I+didnt+even+realise+how+long+it+was+going+to+take+to+type+them+all.+So+many+characters.+I'm+bored+now+so+I'll+just+copy+and+paste.+I'm+bored+now+so+I'll+just+copy+and+paste+Rz+.I'm+bored+now+so+I'll+just+copy+and+paste.I'm+bored+now+so+I'll+just+copy+and+paste.I'm+bored+now+so+I'll+just+copy+and+paste.+It+has+to+be+freaking+enormously+freaking+enormous HTTP 302
http://bit.do/fTyHt HTTP 301
https://jassksa.com/image/payment/panasia/bank-images/aven/ HTTP 302
https://jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/ Redirect Chain
|
30 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.css
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
134 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom.css
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
2 KB 665 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans.css
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
1 KB 385 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading_payment.gif
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
11 KB 11 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
62617_1589791686.jpg
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
38 KB 38 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cards.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p1.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p2.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p3.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
credit-cards.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
visa-icon.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
master-card-icon.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sadad-en-2016.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rotate-device.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
express-checkout.png
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UN7rgOUuhp.woff2
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
12 KB 3 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem8YaGs126MiZpBA-UFVZ0b.woff2
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
12 KB 3 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem5YaGs126MiZpBA-UNirkOUuhp.woff2
jassksa.com/image/payment/panasia/bank-images/aven/NV6588123/files/ |
12 KB 3 KB |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Saudi Post (Government)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| $cc2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
cutt.ly/ | Name: PHPSESSID Value: phd7s6rtd3ahf3rdghg19qrm20 |
|
jassksa.com/ | Name: OCSESSID Value: 17a7921387dde2c55d3e0abb73 |
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bit.do
cutt.ly
gotos.in
jassksa.com
192.185.29.139
2606:4700:10::6816:e8
34.196.20.94
54.83.52.76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