jp-bank.jepsnpastjp.com
Open in
urlscan Pro
27.124.38.34
Malicious Activity!
Public Scan
Effective URL: https://jp-bank.jepsnpastjp.com/
Submission: On December 14 via manual from JP
Summary
TLS certificate: Issued by R3 on December 14th 2020. Valid for: 3 months.
This is the only time jp-bank.jepsnpastjp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Japan Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 25 | 27.124.38.34 27.124.38.34 | 64050 (BCPL-SG B...) (BCPL-SG BGPNET Global ASN) | |
23 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
25 |
jepsnpastjp.com
2 redirects
jp-bank.jepsnpastjp.com |
209 KB |
23 | 1 |
Domain | Requested by | |
---|---|---|
25 | jp-bank.jepsnpastjp.com |
2 redirects
jp-bank.jepsnpastjp.com
|
23 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
direct.jp-bank.japanpost.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
jp-bank.jepsnpastjp.com R3 |
2020-12-14 - 2021-03-14 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jp-bank.jepsnpastjp.com/
Frame ID: 769CA02EB8306DA67E23D2F99D6EBF03
Requests: 23 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://jp-bank.jepsnpastjp.com/
HTTP 301
https://jp-bank.jepsnpastjp.com/ Page URL
-
https://jp-bank.jepsnpastjp.com/?token_key=31f69d4a2309c4df87a997b66ebb502731607920675_147845
HTTP 302
https://jp-bank.jepsnpastjp.com/ Page URL
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://jp-bank.jepsnpastjp.com/
HTTP 301
https://jp-bank.jepsnpastjp.com/ Page URL
-
https://jp-bank.jepsnpastjp.com/?token_key=31f69d4a2309c4df87a997b66ebb502731607920675_147845
HTTP 302
https://jp-bank.jepsnpastjp.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://jp-bank.jepsnpastjp.com/ HTTP 301
- https://jp-bank.jepsnpastjp.com/
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
jp-bank.jepsnpastjp.com/ Redirect Chain
|
369 B 521 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
/
jp-bank.jepsnpastjp.com/ Redirect Chain
|
14 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dgCJbase.css
jp-bank.jepsnpastjp.com/youju/ |
163 KB 37 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
mjl.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
heightLine.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
run.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dgbjRequestControllerP01.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rh.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rsa.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJheader_img_01.jpg
jp-bank.jepsnpastjp.com/youju/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJdirect_img_01.jpg
jp-bank.jepsnpastjp.com/youju/ |
25 KB 25 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
phissingmail.png
jp-bank.jepsnpastjp.com/youju/ |
49 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJfooter_img_01.jpg
jp-bank.jepsnpastjp.com/youju/ |
24 KB 25 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJfooter_img_02.jpg
jp-bank.jepsnpastjp.com/youju/ |
28 KB 28 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
run.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dgbjRequestControllerP01.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rh.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
rsa.js.%E4%B8%8B%E8%BD%BD
jp-bank.jepsnpastjp.com/youju/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJicon_05.gif
jp-bank.jepsnpastjp.com/img/icon/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJicon_04.gif
jp-bank.jepsnpastjp.com/img/icon/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJicon_01.gif
jp-bank.jepsnpastjp.com/img/icon/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
DFCJicon_window01.gif
jp-bank.jepsnpastjp.com/img/icon/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Japan Post (Transportation)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jp-bank.jepsnpastjp.com
27.124.38.34
22deb3c288aa42cc50140d782d5f4f7d1619857a9df25db9cf925b6fdb30f8db
4488b322afebd15f666c2f3fe09e0d2a2b6caf5e6e1ff2b1797b6d7e304ef325
58d64bad8f43a6c332a2e1639a566bd482c812b3f892d4aba9ae15be8d06eb8f
6a3a7e7dacffe678071af680dacaa04449dcfadfb7c885010f1631c80cffe61f
b4ff878c5eb95950a30cbb613830ff9bb4842bdd7762b822a9f4591cb2dc64eb
bdd8000d37fa4698590e721db10f65f8a2d435cded92f56323fd9e354bf17619
c22cc6ac9b1c3975b4a0a40d5176fb4e7f76d27530834366711e122a8ac351af
e32955090a8333042b72e9a37315e22e7a1345f6589e852af6a5baeb85b3840e