banquepostale.co
Open in
urlscan Pro
2606:4700:30::681c:1054
Malicious Activity!
Public Scan
Effective URL: https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d...
Submission: On August 24 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on August 24th 2019. Valid for: a year.
This is the only time banquepostale.co was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banque Postale (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 17 | 2606:4700:30:... 2606:4700:30::681c:1054 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
banquepostale.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
banquepostale.co
2 redirects
banquepostale.co |
149 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
17 | banquepostale.co |
2 redirects
banquepostale.co
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-08-24 - 2020-08-23 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/index.php?ActivationID=163724072163724072163724072
Frame ID: 83492143D8F1B07C3C1FDC2D2650AE66
Requests: 6 HTTP requests in this frame
Frame:
https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/login.php
Frame ID: 6149C468B6D0DE0ECA3717EE72DD61C3
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://banquepostale.co/
HTTP 302
https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a32500... HTTP 302
https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a32500... Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://banquepostale.co/
HTTP 302
https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/index.php HTTP 302
https://banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/index.php?ActivationID=163724072163724072163724072 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.php
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/ Redirect Chain
|
1 KB 456 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_01.gif
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/images/ |
7 KB 7 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_02.gif
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/images/ |
4 KB 4 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_04.gif
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/images/ |
16 KB 16 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index_05.gif
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/images/ |
62 KB 62 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.php
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/ Frame 6149 |
5 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/images/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cvs_all.css
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/css/ Frame 6149 |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cvs_portable.css
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/css/ Frame 6149 |
1001 B 348 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
transparent.gif
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/images/ Frame 6149 |
42 B 102 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.7.2.min.js
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/js/ Frame 6149 |
93 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
val_keypad_cvvs-commun-unifie.js
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/js/ Frame 6149 |
12 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
val_keypad_cvvs-unifie.js
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/js/ Frame 6149 |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bad.png
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/img/ Frame 6149 |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.png
banquepostale.co/bb62b2fdfa7263f0cb4bdef3e5c97007ff43d810c3f20e4964c1d612bda54784c26e17a325002050e81268470c31a20d/_web.cso/data_img/ Frame 6149 |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banque Postale (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.banquepostale.co/ | Name: __cfduid Value: d8c3b61081d93e5391ca8fadb8ef1909a1566682776 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banquepostale.co
2606:4700:30::681c:1054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