workcoinpay.com
Open in
urlscan Pro
213.158.94.227
Malicious Activity!
Public Scan
Submission: On December 27 via api from US — Scanned from US
Summary
TLS certificate: Issued by R3 on November 27th 2023. Valid for: 3 months.
This is the only time workcoinpay.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Leboncoin (E-commerce)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 213.158.94.227 213.158.94.227 | 34762 (COMBELL-AS) (COMBELL-AS) | |
2 | 151.101.1.229 151.101.1.229 | 54113 (FASTLY) (FASTLY) | |
2 3 | 104.16.125.175 104.16.125.175 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 3 |
ASN34762 (COMBELL-AS, BE)
PTR: 213.158.94.227.static.teamblue-ops.net
workcoinpay.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
workcoinpay.com
workcoinpay.com |
201 KB |
3 |
unpkg.com
2 redirects
unpkg.com — Cisco Umbrella Rank: 857 |
26 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 313 |
50 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
5 | workcoinpay.com |
workcoinpay.com
|
3 | unpkg.com |
2 redirects
workcoinpay.com
|
2 | cdn.jsdelivr.net |
workcoinpay.com
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
workcoinpay.com R3 |
2023-11-27 - 2024-02-25 |
3 months | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://workcoinpay.com/
Frame ID: 27013A0EFB073BB8BCA0263F13059627
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Achat -Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Laravel (Web Frameworks) Expand
Detected patterns
Livewire (Web frameworks) Expand
Detected patterns
- <[^>]{1,512}\bwire:
- livewire(?:\.min)?\.js
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://unpkg.com/imask HTTP 302
- https://unpkg.com/imask@7.3.0 HTTP 302
- https://unpkg.com/imask@7.3.0/dist/imask.js
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
workcoinpay.com/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.3.0-alpha1/dist/css/ |
216 KB 33 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
workcoinpay.com/statics/css/ |
2 KB 834 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cdn.min.js
cdn.jsdelivr.net/npm/alpinejs@3.x.x/dist/ |
42 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
identity-main.svg
workcoinpay.com/statics/pictures/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
imask.js
unpkg.com/imask@7.3.0/dist/ Redirect Chain
|
114 KB 25 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
livewire.js
workcoinpay.com/livewire/ |
171 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
poppins.regular.ttf
workcoinpay.com/statics/fonts/ |
142 KB 142 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Leboncoin (E-commerce)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| IMask object| Livewire object| livewire string| livewire_app_url string| livewire_token function| deferLoadingAlpine object| Alpine2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
workcoinpay.com/ | Name: XSRF-TOKEN Value: eyJpdiI6ImxnV0hlVlBIZm9wNitWckNxS2F3a1E9PSIsInZhbHVlIjoiVk1heWJQd3lhczJPemhpSHJmMXFnaVM4N1JGZ2RXbXV1QVpLcFJBZlRISDBpOHFMSjVrcFdpcDF1SFV3UXFDY0JUWURFVUtEWFh4NDExWERXU1Erc3lIWVZ2U045TVRlcmNncVhpYUYxSFdTeVd2QjVBRU9zRW42TVIvS3pvK1QiLCJtYWMiOiIyNzRiNDUzOTlkOWMwZDllZTI3MWVkODdkYWY3Nzk2NGEyNzNhOTMyOTc1NTU0MzA2MmZlNTI5ZTZmMmE1Njg5IiwidGFnIjoiIn0%3D |
|
workcoinpay.com/ | Name: laravel_session Value: eyJpdiI6InlDbmswVzRPTXpmRnpBM2JYUUZUdkE9PSIsInZhbHVlIjoid1RQMEtBeWhIL0kzNk4wUWN1WVBGRFllKzRGbDZDWGtScTAzYlNsd1RyS2NkVnV0d3ZrdE8rRmNrSXNIVHRqaUZYckRUNjc2UEJNdGtBMWNPTVZZTXI1ZDNsWE8rRHgrekRzTHVZd1MyQTZLbFl5d1Bma3lqK3pCZ1hjczlTcXMiLCJtYWMiOiIxZWMyZTZhYzQ5MWQxZTBkYjE0NDBkMGU3MDE2NGFhZjcwMGFlYzk0YjdhMGZhNjIzY2MyYWVhZjk5MzdhZGVlIiwidGFnIjoiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
unpkg.com
workcoinpay.com
104.16.125.175
151.101.1.229
213.158.94.227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