assurance-maladie.herokuapp.com
Open in
urlscan Pro
34.192.68.110
Malicious Activity!
Public Scan
Effective URL: https://assurance-maladie.herokuapp.com/
Submission: On October 30 via manual from FR
Summary
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on April 19th 2017. Valid for: 3 years.
This is the only time assurance-maladie.herokuapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Assurance Maladie (Healthcare)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 51.68.209.107 51.68.209.107 | 16276 (OVH) (OVH) | |
5 | 34.192.68.110 34.192.68.110 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
3 | 52.201.30.51 52.201.30.51 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
1 | 52.210.248.66 52.210.248.66 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
9 | 3 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-34-192-68-110.compute-1.amazonaws.com
assurance-maladie.herokuapp.com |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-201-30-51.compute-1.amazonaws.com
assurance-maladie.herokuapp.com |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-52-210-248-66.eu-west-1.compute.amazonaws.com
redirection-labib.herokuapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
herokuapp.com
assurance-maladie.herokuapp.com redirection-labib.herokuapp.com |
106 KB |
2 |
dgfpitar.net
2 redirects
dgfpitar.net |
330 B |
9 | 2 |
Domain | Requested by | |
---|---|---|
8 | assurance-maladie.herokuapp.com |
assurance-maladie.herokuapp.com
|
2 | dgfpitar.net | 2 redirects |
1 | redirection-labib.herokuapp.com |
assurance-maladie.herokuapp.com
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.herokuapp.com DigiCert SHA2 High Assurance Server CA |
2017-04-19 - 2020-06-22 |
3 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://assurance-maladie.herokuapp.com/
Frame ID: 80BA78E1FE37A4F59B66BB4D6E0FE508
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://dgfpitar.net/wordpress?mailpoet_router&endpoint=track&action=click&data=WyIxNDM1NSIsIjk4Z...
HTTP 301
https://dgfpitar.net/wordpress/?mailpoet_router&endpoint=track&action=click&data=WyIxNDM1NSIsIjk4... HTTP 302
https://assurance-maladie.herokuapp.com/ Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://dgfpitar.net/wordpress?mailpoet_router&endpoint=track&action=click&data=WyIxNDM1NSIsIjk4ZTVjZSIsIjIiLCIwMGJkMTFkNzYzNjMiLGZhbHNlXQ
HTTP 301
https://dgfpitar.net/wordpress/?mailpoet_router&endpoint=track&action=click&data=WyIxNDM1NSIsIjk4ZTVjZSIsIjIiLCIwMGJkMTFkNzYzNjMiLGZhbHNlXQ HTTP 302
https://assurance-maladie.herokuapp.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
assurance-maladie.herokuapp.com/ Redirect Chain
|
518 B 629 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
general.css
assurance-maladie.herokuapp.com/static/css/ |
633 B 650 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.12e82920.css
assurance-maladie.herokuapp.com/static/css/ |
63 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.e3de9fc3.js
assurance-maladie.herokuapp.com/static/js/ |
282 KB 79 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_regime_general.57cf389e.bin
assurance-maladie.herokuapp.com/static/media/ |
6 KB 6 KB |
Image
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
menu-separateur.png
assurance-maladie.herokuapp.com/static/images/ |
115 B 361 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ameli-footer.png
assurance-maladie.herokuapp.com/static/images/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
picto-fleche-action.png
assurance-maladie.herokuapp.com/static/images/ |
204 B 450 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
analytics
redirection-labib.herokuapp.com// |
5 B 261 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Assurance Maladie (Healthcare)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assurance-maladie.herokuapp.com
dgfpitar.net
redirection-labib.herokuapp.com
34.192.68.110
51.68.209.107
52.201.30.51
52.210.248.66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