0rnged06131.netlify.app Open in urlscan Pro
2a03:b0c0:3:e0::1b:1  Malicious Activity! Public Scan

URL: https://0rnged06131.netlify.app/
Submission Tags: 6970089
Submission: On February 15 via api from NL

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2a03:b0c0:3:e0::1b:1, located in Frankfurt am Main, Germany and belongs to DIGITALOCEAN-ASN, US. The main domain is 0rnged06131.netlify.app.
TLS certificate: Issued by AlphaSSL CA - SHA256 - G2 on March 4th 2020. Valid for: a year.
This is the only time 0rnged06131.netlify.app was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Orange (Telecommunication)

Domain & IP information

IP Address AS Autonomous System
1 2a03:b0c0:3:e... 14061 (DIGITALOC...)
1 2a01:c9c0:b3:... 24600 (WANADOOPO...)
2 213.186.33.2 16276 (OVH)
4 3
Apex Domain
Subdomains
Transfer
2 fforces.com
fforces.com
32 KB
1 woopic.com
cdn.woopic.com
1 netlify.app
0rnged06131.netlify.app
3 KB
4 3
Domain Requested by
2 fforces.com 0rnged06131.netlify.app
1 cdn.woopic.com 0rnged06131.netlify.app
1 0rnged06131.netlify.app
4 3

This site contains no links.

Subject Issuer Validity Valid
*.netlify.app
AlphaSSL CA - SHA256 - G2
2020-03-04 -
2021-03-05
a year crt.sh
cdn.woopic.com
DigiCert SHA2 Secure Server CA
2020-05-11 -
2021-06-11
a year crt.sh
devgraphik.com
R3
2021-02-07 -
2021-05-08
3 months crt.sh

This page contains 1 frames:

Primary Page: https://0rnged06131.netlify.app/
Frame ID: FCB628A1B2B9FAC4E1A30C9BEBF2135E
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Netlify/i

Page Statistics

4
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

35 kB
Transfer

54 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
0rnged06131.netlify.app/
23 KB
3 KB
Document
General
Full URL
https://0rnged06131.netlify.app/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a03:b0c0:3:e0::1b:1 Frankfurt am Main, Germany, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Netlify /
Resource Hash
2944af968bd625170d1b65fab54d8fd1a5483f17de193bc894b122f07e134b10
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

:method
GET
:authority
0rnged06131.netlify.app
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

cache-control
public, max-age=0, must-revalidate
content-type
text/html; charset=UTF-8
date
Mon, 15 Feb 2021 22:43:36 GMT
etag
"21270fa52710d46780596f8677ad0cf9-ssl-df"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
br
content-length
2872
age
0
server
Netlify
vary
Accept-Encoding
x-nf-request-id
ce5129dc-58c7-429a-809f-519286685464-33630511
bundle.min.css
cdn.woopic.com/c15d9d8fc98141b084d96f795046449b/auth-1.4.0/css/
0
0
Stylesheet
General
Full URL
https://cdn.woopic.com/c15d9d8fc98141b084d96f795046449b/auth-1.4.0/css/bundle.min.css
Requested by
Host: 0rnged06131.netlify.app
URL: https://0rnged06131.netlify.app/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a01:c9c0:b3:3000::137 , France, ASN24600 (WANADOOPORTAILS-AS Wanadoo Portails/Direction technique, FR),
Reverse DNS
Software
/
Resource Hash

Request headers

Referer
https://0rnged06131.netlify.app/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

ban.png
fforces.com/public/imghost/images/
28 KB
29 KB
Image
General
Full URL
https://fforces.com/public/imghost/images/ban.png
Requested by
Host: 0rnged06131.netlify.app
URL: https://0rnged06131.netlify.app/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
213.186.33.2 , France, ASN16276 (OVH, FR),
Reverse DNS
cluster002.ovh.net
Software
Apache /
Resource Hash
1ca3486e7d9ea0c22994e8447e7646957ea37386447ddf9762701229c13a9bd4

Request headers

Referer
https://0rnged06131.netlify.app/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 15 Feb 2021 22:43:37 GMT
last-modified
Tue, 28 Aug 2018 21:01:18 GMT
server
Apache
content-type
image/png
cache-control
max-age=900
accept-ranges
bytes
content-length
29172
expires
Mon, 15 Feb 2021 22:58:37 GMT
logo.png
fforces.com/public/imghost/images/
3 KB
3 KB
Image
General
Full URL
https://fforces.com/public/imghost/images/logo.png
Requested by
Host: 0rnged06131.netlify.app
URL: https://0rnged06131.netlify.app/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
213.186.33.2 , France, ASN16276 (OVH, FR),
Reverse DNS
cluster002.ovh.net
Software
Apache /
Resource Hash
b36e8ca10880ffc8a3903cd991589fbbe8aa75cbff6315f475be1ed0e9bda472

Request headers

Referer
https://0rnged06131.netlify.app/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 15 Feb 2021 22:43:37 GMT
last-modified
Fri, 27 Jul 2018 13:20:05 GMT
server
Apache
content-type
image/png
cache-control
max-age=900
accept-ranges
bytes
content-length
3354
expires
Mon, 15 Feb 2021 22:58:37 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Orange (Telecommunication)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated string| m string| d

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload