![](/screenshots/7a1f6b31-b7b3-447e-b340-33249521f170.png)
aqf.eup.mybluehost.me
Open in
urlscan Pro
162.241.217.30
Malicious Activity!
Public Scan
Submission: On March 31 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by R3 on March 17th 2024. Valid for: 3 months.
This is the only time aqf.eup.mybluehost.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Orange Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 162.241.217.30 162.241.217.30 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
2 | 2a00:1450:400... 2a00:1450:4001:82a::200a | 15169 (GOOGLE) (GOOGLE) | |
11 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box5451.bluehost.com
aqf.eup.mybluehost.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
mybluehost.me
aqf.eup.mybluehost.me |
189 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 357 |
60 KB |
0 |
totalenergies.fr
Failed
www.totalenergies.fr Failed |
|
11 | 3 |
Domain | Requested by | |
---|---|---|
8 | aqf.eup.mybluehost.me |
aqf.eup.mybluehost.me
|
2 | ajax.googleapis.com |
aqf.eup.mybluehost.me
|
0 | www.totalenergies.fr Failed |
aqf.eup.mybluehost.me
|
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
webmail.aqf.eup.mybluehost.me R3 |
2024-03-17 - 2024-06-15 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2024-03-04 - 2024-05-27 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/IdenREU
Frame ID: EC9DC548104263C669B6792729980DAB
Requests: 11 HTTP requests in this frame
Screenshot
![](/screenshots/7a1f6b31-b7b3-447e-b340-33249521f170.png)
Page Title
Authentification - Orange BankDetected technologies
Detected patterns
- /wp-(?:content|includes)/
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
IdenREU
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome.min.css
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/triangle/css/ |
57 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.css
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/triangle/css/ |
58 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.1/ |
82 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/files/ |
4 KB 866 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.4.1/ |
86 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
function.js
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/files/ |
262 B 203 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oblogo.png
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/files/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
codes_parrainage.png
www.totalenergies.fr/fileadmin/Digital/Illustrations/Parlons-Energie/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Roboto-Regular.ttf
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/files/ |
155 KB 155 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
aqf.eup.mybluehost.me/wp-content/COMMUNAUT/zBhLTcyMTItMD/OrangeBank/App/Portal/ |
4 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.totalenergies.fr
- URL
- https://www.totalenergies.fr/fileadmin/Digital/Illustrations/Parlons-Energie/codes_parrainage.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Orange Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onpagereveal function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
aqf.eup.mybluehost.me/ | Name: PHPSESSID Value: 36e545878d147ab03bd358b63e480609 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
aqf.eup.mybluehost.me
www.totalenergies.fr
www.totalenergies.fr
162.241.217.30
2a00:1450:4001:82a::200a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