workcoinpay.com
Open in
urlscan Pro
213.158.94.227
Malicious Activity!
Public Scan
Effective URL: https://workcoinpay.com/
Submission: On April 19 via api from BY — Scanned from IT
Summary
TLS certificate: Issued by R3 on March 25th 2024. Valid for: 3 months.
This is the only time workcoinpay.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Leboncoin (E-commerce)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 213.158.94.227 213.158.94.227 | 34762 (COMBELL-AS) (COMBELL-AS) | |
2 | 2606:4700::68... 2606:4700::6810:5914 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 3 | 104.17.246.203 104.17.246.203 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 3 |
ASN34762 (COMBELL-AS, BE)
PTR: 213.158.94.227.static.teamblue-ops.net
workcoinpay.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
workcoinpay.com
workcoinpay.com |
201 KB |
3 |
unpkg.com
2 redirects
unpkg.com — Cisco Umbrella Rank: 744 |
36 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 320 |
49 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
6 | workcoinpay.com |
workcoinpay.com
|
3 | unpkg.com |
2 redirects
workcoinpay.com
|
2 | cdn.jsdelivr.net |
workcoinpay.com
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
workcoinpay.com R3 |
2024-03-25 - 2024-06-23 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-02 - 2024-05-01 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://workcoinpay.com/
Frame ID: EE88234DC83D4ABB470395939B97FC72
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Achat -Page URL History Show full URLs
-
http://workcoinpay.com/
HTTP 307
https://workcoinpay.com/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Laravel (Web Frameworks) Expand
Detected patterns
Livewire (Web frameworks) Expand
Detected patterns
- <[^>]{1,512}\bwire:
- livewire(?:\.min)?\.js
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://workcoinpay.com/
HTTP 307
https://workcoinpay.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://unpkg.com/imask HTTP 302
- https://unpkg.com/imask@7.6.0 HTTP 302
- https://unpkg.com/imask@7.6.0/dist/imask.js
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
workcoinpay.com/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.3.0-alpha1/dist/css/ |
216 KB 32 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
workcoinpay.com/statics/css/ |
2 KB 834 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
cdn.min.js
cdn.jsdelivr.net/npm/alpinejs@3.x.x/dist/ |
43 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
identity-main.svg
workcoinpay.com/statics/pictures/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
imask.js
unpkg.com/imask@7.6.0/dist/ Redirect Chain
|
121 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
livewire.js
workcoinpay.com/livewire/ |
171 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
poppins.regular.ttf
workcoinpay.com/statics/fonts/ |
142 KB 142 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
workcoinpay.com/ |
0 121 B |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Leboncoin (E-commerce)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| IMask object| Livewire object| livewire string| livewire_app_url string| livewire_token function| deferLoadingAlpine object| Alpine2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
workcoinpay.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Ik1GUE5xTDNBeCtWcTJQMkE2RW1Udnc9PSIsInZhbHVlIjoieHBlOU8wYnJLQitiYlF2VmRvSC90SVd6YjdmMy9oWmdmamplV2hJT1J4SUNEcXo0T1dRSy9YVDN5RlhmM2ZUL1pna3V0TEpBZWVka2Q4aTd6MFlvVi9mMGlSNDJxTmlEUXlNc3VxaEtwS0thN0dtYUQwbDNIYURXalpKM1NQdWQiLCJtYWMiOiJlNjJlOTEzZTIwMDliNmRkYWQ2NGZjMjUzYTY0OTU5N2ZjMWYwMjhhYjE4MTcxNTk4Y2I4NjMyN2E4YmJmZGM1IiwidGFnIjoiIn0%3D |
|
workcoinpay.com/ | Name: laravel_session Value: eyJpdiI6IlRlY0RnZlBMankyWFJaanV2WXB2VGc9PSIsInZhbHVlIjoiWGhCbXk4cjhoZ0JGL3NzYlhXU1IvNHltZTdlSEtSdUtjV3pFYW5oZVpnNHBIUE9KYkVPZXU0QzgzNm5IZ20rSWxWRUx3UHpmbVZGbHBkZ0pDUHplRjFyZW8wMTZURWRGSlRyVGFERSswUGZkOGw4WElDUDQvbHQ3VzhvUExOL3kiLCJtYWMiOiIxOWMzYjdkZDAyZWVlZDRiYzVjMGZkYjM4OGVjNDZiMjIzZGU1ZDE1ZjdhZDU5YzQyY2NhNjdhNGJjZjlmZGI1IiwidGFnIjoiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
unpkg.com
workcoinpay.com
104.17.246.203
213.158.94.227
2606:4700::6810:5914
2425ebbc021bfdd18fe55edbeeb1539d22a217212c14430a7d4d75266a333bbc
34ca2ea74c4825f807032b6b4c296fe9cd5bf5ce1c7fc336e09c0309a360ade0
38a4dc885f9d1267bbfaf361e24fbf51994bd7f6743784ec3e4a267bbe74a0be
755edc5b26465da4ea363e856963e39ce975702797eb1d16e1aa7cbee5110861
92762d92cee61a7f070427230bdf13b0cf894bd1bbedf64a1b657837dc6a9285
932ea15108928991bcf0c0a46415fc652de5ffc0158c35205357b90c65eeb386
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e556bb4305210bf27a42deb66aa28dba48be99488403079e0cac7a70fdaa53b3
eb6fd36921da8fc6e56175b49f47ae95c30da3bcf645fa86d32e7600eb45066e