jtmu0.com
Open in
urlscan Pro
104.21.61.13
Malicious Activity!
Public Scan
Effective URL: https://jtmu0.com/info.php
Submission: On March 17 via manual from JP — Scanned from JP
Summary
TLS certificate: Issued by GTS CA 1P5 on March 16th 2023. Valid for: 3 months.
This is the only time jtmu0.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Yamato Transport (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 104.21.61.13 104.21.61.13 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 1 |
Domain | Requested by | |
---|---|---|
13 | jtmu0.com |
1 redirects
jtmu0.com
|
12 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
faq.kuronekoyamato.co.jp |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jtmu0.com GTS CA 1P5 |
2023-03-16 - 2023-06-14 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://jtmu0.com/info.php
Frame ID: 74331CCB041393BBA69122B44BA6946B
Requests: 9 HTTP requests in this frame
Frame:
https://jtmu0.com/cdn-cgi/challenge-platform/h/g/scripts/alpha/invisible.js?ts=1679025600
Frame ID: AB3A3CF5E9B6491AFCB31564D355E850
Requests: 3 HTTP requests in this frame
Screenshot
Page Title
荷物お問い合わせシステムPage URL History Show full URLs
-
https://jtmu0.com/
HTTP 302
https://jtmu0.com/info.php Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: よくある質問
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://jtmu0.com/
HTTP 302
https://jtmu0.com/info.php Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
info.php
jtmu0.com/ Redirect Chain
|
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
jtmu0.com/css/ |
45 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
jtmu0.com/image/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-jitbox.png
jtmu0.com/image/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
com_logo.png
jtmu0.com/image/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
com_sns_ic05.png
jtmu0.com/image/ |
8 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
com_sns_ic02.png
jtmu0.com/image/ |
14 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
com_sns_ic03.png
jtmu0.com/image/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
com_sns_ic04.png
jtmu0.com/image/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
invisible.js
jtmu0.com/cdn-cgi/challenge-platform/h/g/scripts/alpha/ Frame AB3A |
26 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pica.js
jtmu0.com/cdn-cgi/challenge-platform/h/g/scripts/ Frame AB3A |
7 KB 3 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
7a9289e79f3fe03d
jtmu0.com/cdn-cgi/challenge-platform/h/g/cv/result/ Frame AB3A |
2 B 514 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Yamato Transport (Transportation)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 boolean| credentialless number| w number| h function| openWebsrv_top function| PRINT_02 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jtmu0.com/ | Name: PHPSESSID Value: l2rhlctes4nvupjqm8cjoh875b |
|
.jtmu0.com/ | Name: __cf_bm Value: gByCPG.T6XIgaY1k0rS_LoJPrA.5oGyWDMmh1SaUj2s-1679027826-0-AcNVXicaoU88ImO8I3G3C1qeQqki/LHhJgsTQd0wS26aULE5FNlvqDSDtSSeu326yL9i1TK+ggTtwwONJDXFO2L8hjqyNk1U1njaD6GNFrgn1MiiksgbqnuuIJfE2oylTg== |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jtmu0.com
104.21.61.13
0efe90ec10b6a4157a6fa596b16164861e20a2d8cdf2443806a1a71bcd19bc8d
177d44ff4c8947cc6616e70876226ee100e472273ab3e8a65741e53e53137438
2594c084948733af513aa6064e08903964281bc4079e59a6422de3814884b053
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
277027dd1b2376d6ed0ebdef036764aa4f74204e85edb19b15944b9ed3909c87
43178d623716da66afa896e9a43ec859f807494ce22331de996744006949a368
702be8c20ee12eafc6a24f4ad278330b5ed9d500cb3542d019ae890dbd78093b
943ceefa11b26321d787c9f77d0dae3b8b8404dea09b3716f99c08974674eab5
ab5e9ff452677b132cbe0c646ec936a501212636d2389307638435a9025e0328
d2af028443cfb6f20641bd2a9788de13ac102516dc1e17e3ccc1721cc25e9d31
f6e651f94a1f6ade5e4668fe33c3b044328dd8ccbb2939924681a395f09d82a4
fa88ab24a7241ee4cc6923d9969f3d27096a672e6bb87d85b9f33e1a02ca4b10