![](/screenshots/f20a73d8-0ade-4705-8d00-8db577c5b148.png)
jmlagne.ddns.net
Open in
urlscan Pro
51.89.22.198
Malicious Activity!
Public Scan
Effective URL: https://jmlagne.ddns.net/remboursement?email=
Submission: On August 04 via api from BE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 3rd 2019. Valid for: 3 months.
This is the only time jmlagne.ddns.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Impots Gouv (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.54 167.89.123.54 | 11377 (SENDGRID) (SENDGRID - SendGrid) | |
1 1 | 67.199.248.10 67.199.248.10 | 395224 (BITLY-AS) (BITLY-AS - Bitly Inc) | |
8 | 51.89.22.198 51.89.22.198 | 16276 (OVH) (OVH) | |
8 | 1 |
ASN11377 (SENDGRID - SendGrid, Inc., US)
PTR: o16789123x54.outbound-mail.sendgrid.net
url663.brandbassador.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
ddns.net
jmlagne.ddns.net |
603 KB |
1 |
bit.ly
1 redirects
bit.ly |
346 B |
1 |
brandbassador.com
1 redirects
url663.brandbassador.com |
232 B |
8 | 3 |
Domain | Requested by | |
---|---|---|
8 | jmlagne.ddns.net |
jmlagne.ddns.net
|
1 | bit.ly | 1 redirects |
1 | url663.brandbassador.com | 1 redirects |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jmlagne.ddns.net cPanel, Inc. Certification Authority |
2019-08-03 - 2019-11-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://jmlagne.ddns.net/remboursement?email=
Frame ID: 58ACED42AD2434F5C43EE0AE403F9A75
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/f20a73d8-0ade-4705-8d00-8db577c5b148.png)
Page URL History Show full URLs
-
http://url663.brandbassador.com/wf/click?upn=OXfAzP88hARL6ecmB1z6eYVVyfrIXfbAqozqRVqM9tk-3D_aNXG751WGyUQuvqi...
HTTP 302
http://bit.ly/2KB9Gyv HTTP 301
https://jmlagne.ddns.net/ Page URL
- https://jmlagne.ddns.net/remboursement?email= Page URL
Detected technologies
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://url663.brandbassador.com/wf/click?upn=OXfAzP88hARL6ecmB1z6eYVVyfrIXfbAqozqRVqM9tk-3D_aNXG751WGyUQuvqiLzSXsd6c3Ru3X7cZVDiLYLEBLkBdZDmI3wTrzGg0atezYmA6HtZEFdeA0ybqhvl2A-2FRUdJQ9k9GgBeV6v57IU9cW0pboqS7Z-2FqaAGlNTpoCl7wRh96HEmh6j-2FTsrNdSXUWxi-2BpkxwKtN6-2BWteZbJqA-2BdzJCpOhUZTpv3Q4-2FnHPC-2FSgyF3k7Ph8fvEk9tzRds400qxA2hhZfL9dkxSOgthBq8nbQ-3D
HTTP 302
http://bit.ly/2KB9Gyv HTTP 301
https://jmlagne.ddns.net/ Page URL
- https://jmlagne.ddns.net/remboursement?email= Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://url663.brandbassador.com/wf/click?upn=OXfAzP88hARL6ecmB1z6eYVVyfrIXfbAqozqRVqM9tk-3D_aNXG751WGyUQuvqiLzSXsd6c3Ru3X7cZVDiLYLEBLkBdZDmI3wTrzGg0atezYmA6HtZEFdeA0ybqhvl2A-2FRUdJQ9k9GgBeV6v57IU9cW0pboqS7Z-2FqaAGlNTpoCl7wRh96HEmh6j-2FTsrNdSXUWxi-2BpkxwKtN6-2BWteZbJqA-2BdzJCpOhUZTpv3Q4-2FnHPC-2FSgyF3k7Ph8fvEk9tzRds400qxA2hhZfL9dkxSOgthBq8nbQ-3D HTTP 302
- http://bit.ly/2KB9Gyv HTTP 301
- https://jmlagne.ddns.net/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
![]() jmlagne.ddns.net/ Redirect Chain
|
631 B 1013 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
humanoth.gif
jmlagne.ddns.net/img/ |
524 KB 524 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
![]() jmlagne.ddns.net/ |
24 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bavure.png
jmlagne.ddns.net/img/ |
27 KB 27 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
next.png
jmlagne.ddns.net/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sec.png
jmlagne.ddns.net/img/ |
22 KB 22 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bgd_bodyWrap_left.gif
jmlagne.ddns.net/images/ |
345 B 345 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bgd_bodyWrap_right.gif
jmlagne.ddns.net/images/ |
346 B 346 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Impots Gouv (Government)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jmlagne.ddns.net/ | Name: PHPSESSID Value: bd8838395c9cf54f15e53180f61e0788 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bit.ly
jmlagne.ddns.net
url663.brandbassador.com
167.89.123.54
51.89.22.198
67.199.248.10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