coeurdessences.be
Open in
urlscan Pro
51.75.12.186
Malicious Activity!
Public Scan
Submission: On January 17 via api from IE
Summary
TLS certificate: Issued by R3 on January 16th 2021. Valid for: 3 months.
This is the only time coeurdessences.be was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Netflix (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 51.75.12.186 51.75.12.186 | 16276 (OVH) (OVH) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:86c0:209... 2a00:86c0:2090::1 | 40027 (NETFLIX-ASN) (NETFLIX-ASN) | |
6 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
coeurdessences.be
coeurdessences.be |
47 KB |
1 |
nflxext.com
assets.nflxext.com |
72 KB |
1 |
jquery.com
code.jquery.com |
79 KB |
6 | 3 |
Domain | Requested by | |
---|---|---|
4 | coeurdessences.be |
coeurdessences.be
|
1 | assets.nflxext.com |
coeurdessences.be
|
1 | code.jquery.com |
coeurdessences.be
|
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
coeurdessences.be R3 |
2021-01-16 - 2021-04-16 |
3 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.1.nflxso.net DigiCert SHA2 Secure Server CA |
2020-12-31 - 2021-01-30 |
a month | crt.sh |
This page contains 1 frames:
Primary Page:
https://coeurdessences.be/wp-content/upgrade/jss/NFXFR/customer_center/user-116222/sms.php
Frame ID: 960DFEDE50DC390334A9EF7734FE583E
Requests: 6 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
React (JavaScript Frameworks) Expand
Detected patterns
- html /<[^>]+data-react/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
sms.php
coeurdessences.be/wp-content/upgrade/jss/NFXFR/customer_center/user-116222/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
stylex.css
coeurdessences.be/wp-content/upgrade/jss/NFXFR/customer_center/user-116222/assets/ |
201 KB 41 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.js
code.jquery.com/ |
265 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.js
coeurdessences.be/wp-content/upgrade/jss/NFXFR/customer_center/user-116222/assets/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.creditCardValidator.js
coeurdessences.be/wp-content/upgrade/jss/NFXFR/customer_center/user-116222/assets/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
nf-icon-v1-93.woff
assets.nflxext.com/ffe/siteui/fonts/ |
72 KB 72 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Netflix (Online)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
coeurdessences.be/ | Name: PHPSESSID Value: 0nrlol4gu91l9i4ncra8b9bpks |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.nflxext.com
code.jquery.com
coeurdessences.be
2001:4de0:ac19::1:b:2a
2a00:86c0:2090::1
51.75.12.186
09561897ecf363efee5962cf1034f202e80f7752dcdf89d6ea58bab1400fd475
91f2755d95d203b15970ea3a2c9275a3c6e589c674f10a5588c23a98dee6b638
98713b53a74ebe7e326353080c5f1653e83af61d6363c0b3c4c67d6d24197b4d
c5f8fcc96153880f57cb501646dca91ab644f972b43a851e3b087ce4339e5079
c8fbd4c7643250fa9de5d121d281f50236e152fdf4fbf107596836d6872d8a73
d8aa24ecc6cecb1a60515bc093f1c9da38a0392612d9ab8ae0f7f36e6eee1fad