soggerfpt.com
Open in
urlscan Pro
185.66.41.70
Malicious Activity!
Public Scan
Effective URL: http://soggerfpt.com/postale.fr/postale/1eddc/
Submission: On January 15 via automatic, source openphish
Summary
This is the only time soggerfpt.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 20 | 185.66.41.70 185.66.41.70 | 197712 (CDMON sis...) (CDMON sistemes@cdmon.com) | |
3 | 83.206.228.175 83.206.228.175 | 3215 (France Te...) (France Telecom - Orange) | |
21 | 2 |
ASN197712 (CDMON sistemes@cdmon.com, ES)
PTR: vxhch-09.srv.cat
www.soggerfpt.com | |
soggerfpt.com |
ASN3215 (France Telecom - Orange, FR)
PTR: 175-228.206-83.static-ip.oleane.fr
transverse.labanquepostale.fr |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
soggerfpt.com
2 redirects
www.soggerfpt.com soggerfpt.com |
76 KB |
3 |
labanquepostale.fr
transverse.labanquepostale.fr |
4 KB |
21 | 2 |
Domain | Requested by | |
---|---|---|
19 | soggerfpt.com |
2 redirects
soggerfpt.com
|
3 | transverse.labanquepostale.fr |
soggerfpt.com
|
1 | www.soggerfpt.com | |
21 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
transverse.labanquepostale.fr DigiCert SHA2 Extended Validation Server CA |
2018-09-05 - 2020-09-04 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://soggerfpt.com/postale.fr/postale/1eddc/
Frame ID: 6EE5315D59FA8DC332E6ACDC09186EE2
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- http://www.soggerfpt.com/boo/ Page URL
-
http://soggerfpt.com/postale.fr/postale/
HTTP 302
http://soggerfpt.com/postale.fr/postale/1eddc HTTP 301
http://soggerfpt.com/postale.fr/postale/1eddc/ Page URL
Detected technologies
Debian (Operating Systems) ExpandDetected patterns
- headers server /Debian/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://www.soggerfpt.com/boo/ Page URL
-
http://soggerfpt.com/postale.fr/postale/
HTTP 302
http://soggerfpt.com/postale.fr/postale/1eddc HTTP 301
http://soggerfpt.com/postale.fr/postale/1eddc/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.soggerfpt.com/boo/ |
85 B 429 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
soggerfpt.com/postale.fr/postale/1eddc/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cvs_all.css
transverse.labanquepostale.fr/xo_/09_08_02.000//cvvs/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cvs_portable.css
transverse.labanquepostale.fr/xo_/09_08_02.000//cvvs/css/ |
1 KB 749 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
is
soggerfpt.com/postale.fr/postale/1eddc/img/ |
17 B 240 B |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
x.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
833 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
soggerfpt.com/postale.fr/postale/1eddc/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.1.min.js
soggerfpt.com/postale.fr/postale/1eddc/img/ |
108 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
val_keypad_cvvs-commun-unifie.js
soggerfpt.com/postale.fr/postale/1eddc/img/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
val_keypad_cvvs-unifie.js
soggerfpt.com/postale.fr/postale/1eddc/img/ |
9 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.css
transverse.labanquepostale.fr/xo_/09_08_02.000//cvvs/css/ |
810 B 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loginform
soggerfpt.com/postale.fr/postale/1eddc/ |
311 B 311 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online)47 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate string| OST_origin string| OST_flash string| OST_audio5 string| OST_audioOgg string| OST_action string| PATH_STATIQUE string| IMG_ALL function| $ function| jQuery number| NB_CASES object| Vocalisation object| Cookie function| is_touch_device object| CVSVTable function| initVocalisation function| ajouterCookieVocalisation function| activerVocalisation function| desactiverVocalisation function| chargerFichierAudio function| isIOS function| isNoIOS function| activateValid function| deactivateValid object| vocalisationCookie function| updateVocalIOS function| updateVocal string| _envoi function| checkInput function| readCookieBkalias function| IsSafari function| IsSafariMac function| isChrome function| isFirefox string| _domain function| isNavigateurEdge function| modifIdent function| effacerIdMemorise function| valid_ident function| isIdentOk function| sendForm function| blocageAccesCompte function| modif_date function| construireSelectsDate function| construireSelect string| currentPageUrlIs0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
soggerfpt.com
transverse.labanquepostale.fr
www.soggerfpt.com
185.66.41.70
83.206.228.175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