![](/screenshots/da95ea1f-f224-4076-b528-3033ba076a9a.png)
eerakuten.com
Open in
urlscan Pro
154.64.250.17
Malicious Activity!
Public Scan
Submission: On May 30 via automatic, source openphish — Scanned from DE
Summary
This is the only time eerakuten.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Rakuten Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 154.64.250.17 154.64.250.17 | 979 (NETLAB-SDN) (NETLAB-SDN) | |
4 | 23.36.235.239 23.36.235.239 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
8 | 2 |
ASN16625 (AKAMAI-AS, US)
PTR: a23-36-235-239.deploy.static.akamaitechnologies.com
sfes.rakuten-bank.co.jp |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
rakuten-bank.co.jp
sfes.rakuten-bank.co.jp |
55 KB |
4 |
eerakuten.com
eerakuten.com |
101 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
4 | sfes.rakuten-bank.co.jp |
eerakuten.com
sfes.rakuten-bank.co.jp |
4 | eerakuten.com |
eerakuten.com
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sfes.rakuten-bank.co.jp DigiCert EV RSA CA G2 |
2024-05-02 - 2025-05-31 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
http://eerakuten.com/
Frame ID: 261218F4037146339073C8C10D93266E
Requests: 3 HTTP requests in this frame
Frame:
http://eerakuten.com/login.asp
Frame ID: 3C2C6688A3975372B2C5FDCD81061BAB
Requests: 5 HTTP requests in this frame
Screenshot
![](/screenshots/da95ea1f-f224-4076-b528-3033ba076a9a.png)
Page Title
楽天銀行Page URL History Show full URLs
-
http://eerakuten.com/
HTTP 307
https://eerakuten.com/ HTTP 307
http://eerakuten.com/ Page URL
Detected technologies
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://eerakuten.com/
HTTP 307
https://eerakuten.com/ HTTP 307
http://eerakuten.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
eerakuten.com/ Redirect Chain
|
688 B 931 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.6.0.min.js
eerakuten.com/js/ |
87 KB 88 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.asp
eerakuten.com/ Frame 3C2C |
11 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
eerakuten.com/ |
1 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
sfes.rakuten-bank.co.jp/rb/mobile/css/common/cwd2016/ Frame 3C2C |
114 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
sfes.rakuten-bank.co.jp/rb/mobile/img/common/cwd2016/ Frame 3C2C |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ui-icons.svg
sfes.rakuten-bank.co.jp/rb/mobile/css/common/cwd2016/assets/icons/ Frame 3C2C |
13 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
categories-items.svg
sfes.rakuten-bank.co.jp/rb/mobile/css/common/cwd2016/assets/icons/ Frame 3C2C |
137 KB 31 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Rakuten Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
eerakuten.com/ | Name: ASPSESSIONIDQQRDSTBR Value: IMACCFCALFFODAPAKHHBLFED |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
eerakuten.com
sfes.rakuten-bank.co.jp
154.64.250.17
23.36.235.239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