![](/screenshots/62fcc938-5a11-4b30-8dcf-3d45542ca36d.png)
www.celtiweb.fr
Open in
urlscan Pro
31.222.195.29
Malicious Activity!
Public Scan
Submission: On January 06 via automatic, source openphish
Summary
TLS certificate: Issued by Gandi Standard SSL CA 2 on May 28th 2018. Valid for: a year.
This is the only time www.celtiweb.fr was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 31.222.195.29 31.222.195.29 | 8218 (NEO-ASN l...) (NEO-ASN legacy Neotelecoms) | |
3 | 1 |
ASN8218 (NEO-ASN legacy Neotelecoms, FR)
PTR: bv-lamp-01-prod.bellvision.fr
www.celtiweb.fr |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
celtiweb.fr
www.celtiweb.fr |
12 KB |
3 | 1 |
Domain | Requested by | |
---|---|---|
3 | www.celtiweb.fr |
www.celtiweb.fr
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
celtiweb.fr Gandi Standard SSL CA 2 |
2018-05-28 - 2019-05-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.celtiweb.fr/wp-content/pay/Accueil100679/Paypal/authentification/colis=712/
Frame ID: 4F6DC5E3190988D319DAF3F0DF06F346
Requests: 3 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.celtiweb.fr/wp-content/pay/Accueil100679/Paypal/authentification/colis=712/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
submit.png
www.celtiweb.fr/wp-content/pay/Accueil100679/Paypal/authentification/colis=712/images/ |
513 B 825 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
www.celtiweb.fr/wp-content/pay/Accueil100679/Paypal/authentification/colis=712/images/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| formatText function| Effaceuser function| Effaceuserpass0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.celtiweb.fr
31.222.195.29
40c1868d130c67a025c870007622b4ba56aa25fbf1c5139d6eec64801225a41e
af362bee6571f26f0e55bb4251591d41ae21b7e6bf9cb27bb4f0e72963da9bd4
bbe8b49ea3e5d686c49eb56d8c9b1d541abf3d9666248bada405c6fc1ecd4978