maaun.net
Open in
urlscan Pro
192.249.118.11
Malicious Activity!
Public Scan
Effective URL: https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?ggltczt
Submission: On March 15 via manual from FR — Scanned from FR
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on January 31st 2023. Valid for: 3 months.
This is the only time maaun.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tech Support Scam (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 91.211.165.71 91.211.165.71 | 12565 (GROUPE_LDLC) (GROUPE_LDLC) | |
1 1 | 67.199.248.10 67.199.248.10 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
5 | 192.249.118.11 192.249.118.11 | 22611 (INMOTION) (INMOTION) | |
2 | 2606:4700::68... 2606:4700::6810:5614 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 146.75.120.193 146.75.120.193 | 54113 (FASTLY) (FASTLY) | |
2 | 2a00:1450:400... 2a00:1450:4001:813::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
15 | 9 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
maaun.net
maaun.net |
138 KB |
2 |
gstatic.com
fonts.gstatic.com |
31 KB |
2 |
imgur.com
i.imgur.com — Cisco Umbrella Rank: 6053 |
181 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 337 |
48 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 194 |
5 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 784 |
7 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 686 |
29 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 34 |
2 KB |
1 |
bit.ly
1 redirects
bit.ly — Cisco Umbrella Rank: 5069 |
270 B |
1 |
groupe-ldlc.com
1 redirects
affiliation.groupe-ldlc.com |
789 B |
15 | 10 |
Domain | Requested by | |
---|---|---|
5 | maaun.net |
maaun.net
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | i.imgur.com |
maaun.net
|
2 | cdn.jsdelivr.net |
maaun.net
|
1 | cdnjs.cloudflare.com |
maaun.net
|
1 | maxcdn.bootstrapcdn.com |
maaun.net
|
1 | code.jquery.com |
maaun.net
|
1 | fonts.googleapis.com |
maaun.net
|
1 | bit.ly | 1 redirects |
1 | affiliation.groupe-ldlc.com | 1 redirects |
15 | 10 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
maaun.net cPanel, Inc. Certification Authority |
2023-01-31 - 2023-05-01 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-02 - 2023-06-01 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-03-02 - 2023-05-25 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
*.imgur.com Sectigo RSA Domain Validation Secure Server CA |
2023-03-13 - 2024-03-12 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-03-02 - 2023-05-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?ggltczt
Frame ID: EF06D7556AE9D44326F034192B214B6A
Requests: 25 HTTP requests in this frame
Screenshot
Page Title
Centre de sécurité Code0x268d3 ServicessPage URL History Show full URLs
-
https://affiliation.groupe-ldlc.com/scripts/click.php?a_aid=5702dcb116ddb&a_bid=50065587&desturl=//bi%F0%9D%9A%9...
HTTP 301
https://bit.ly/3FiHYUl HTTP 301
https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?fn=qeosvwkmvjyzodo Page URL
- https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?ggltczt Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Modernizr (JavaScript Libraries) Expand
Detected patterns
- ([\d.]+)?/modernizr(?:\.([\d.]+))?.*\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://affiliation.groupe-ldlc.com/scripts/click.php?a_aid=5702dcb116ddb&a_bid=50065587&desturl=//bi%F0%9D%9A%9D%252e%F0%9D%90%A5y%2F3FiHYUl
HTTP 301
https://bit.ly/3FiHYUl HTTP 301
https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?fn=qeosvwkmvjyzodo Page URL
- https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?ggltczt Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://affiliation.groupe-ldlc.com/scripts/click.php?a_aid=5702dcb116ddb&a_bid=50065587&desturl=//bi%F0%9D%9A%9D%252e%F0%9D%90%A5y%2F3FiHYUl HTTP 301
- https://bit.ly/3FiHYUl HTTP 301
- https://maaun.net/producten/vrachtwagen/penetrating-oil-spray/?fn=qeosvwkmvjyzodo
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
maaun.net/producten/vrachtwagen/penetrating-oil-spray/ Redirect Chain
|
27 KB 27 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
maaun.net/producten/vrachtwagen/penetrating-oil-spray/ |
79 B 285 B |
Fetch
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
maaun.net/producten/vrachtwagen/penetrating-oil-spray/ |
95 KB 95 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@4.6.0/dist/css/ |
158 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
26 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-2.2.4.min.js
code.jquery.com/ |
84 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.5.0/css/ |
27 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
GsE7w8v.jpg
i.imgur.com/ |
130 KB 131 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tZ7HPCN.jpg
i.imgur.com/ |
50 KB 50 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
173 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
144 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
226 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
230 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
12 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
239 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
0wa0rni0ng0.mp3
maaun.net/producten/vrachtwagen/penetrating-oil-spray/ |
7 KB 7 KB |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr.min.js
cdnjs.cloudflare.com/ajax/libs/modernizr/2.8.3/ |
11 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@4.6.0/dist/js/ |
82 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alertmicrosoft.mp3
maaun.net/producten/vrachtwagen/penetrating-oil-spray/ |
7 KB 7 KB |
Media
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tech Support Scam (Consumer)20 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless function| $ function| jQuery string| img1 string| img2 string| img3 string| img4 string| img5 string| img6 string| img7 string| img8 string| img9 string| img10 object| html5 object| Modernizr object| bootstrap function| addEvent object| modal object| btn undefined| span2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.groupe-ldlc.com/ | Name: PAPVisitorId Value: 1627d2e6ae33d6f578b4g30yxDSFvb8p |
|
.bit.ly/ | Name: _bit Value: n2fcP1-a0f57ef568ed83e3fa-00m |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
affiliation.groupe-ldlc.com
bit.ly
cdn.jsdelivr.net
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
i.imgur.com
maaun.net
maxcdn.bootstrapcdn.com
146.75.120.193
192.249.118.11
2001:4de0:ac18::1:a:1b
2606:4700::6810:5614
2606:4700::6811:190e
2606:4700::6812:bcf
2a00:1450:4001:808::200a
2a00:1450:4001:813::2003
67.199.248.10
91.211.165.71
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
19e1d69f3f0165800100613106f343aad95e69cea001286622ed7df83191301d
2ed48437101385b0d5e25fca0f8d841410e9d7f1012dabfcd7d43b6eb21637c2
3eeefb1c09a9e49f697208c13ed755ecda0d848e94653d6448725c8722081a1c
4a3421b42cbba578920cadb4e5fe8f4052f49ad4633f04464bcb34d016f4a14f
4ffcc598ee6cff4692c1cea272cd8a2f195f6dec32473e94370d6cdcfa5fe601
81d37206f20d5b5f2471324323d9755c1745d52066147c0aa95b2cb19d6a6465
8bcb650160ca6d0f48023b7c5ec36248b3306c65ea782fb58459b4c810d23279
903583bb294f41c7cccf8141382177d5ffa2f37cc8b3ac95db412dcbb37e7351
9bf84216ea2f792174f07a4eb593d71cf0525aab7471e2a70358c76243695720
a20f67222791a6c586f0765c97d569cc578b666d3d0e47a7f2bd129e4fe64e27
b0212543cc5a4a0a31c1b5a9d1e8973261992116b4cfde3e7dfcf33b4e81a97b
bf8aac766e555530791cdd570abef334c53c9b5d37f3583b7af39262274615f9
cc140ef1e7c5d527ebb4e2e73107909cd646fd0bbdb10ebad305166c8c1b5204
ce8f42e7fdec58e3dd2c75acf71083cd41cbf2b1f84e1c7f63ef89bd6004fbeb
d021f3f93a51420cd151c9a11a1b8f14ddfcbbe519f6bb885817e9b96c44b6a5
d2b82e612d2a812e8be2a57300dab8923c4f2edbe7a799e7da70791b595646fe
ddd92f10ad162c7449eff0acaf40598c05b1111739587edb75e5326b6697c5d5
e4fbdef729764b2c7427805ac2346093f15a0f82b8592b33d59e65f6fcd95b96
ef7a780f7873dd7692e694f4e06a0d61ce24d2a12d14d22793459ec0ade299d6
f5aebdfea35d1e7656ef4acc5db1f243209755ae3300943ef8fc6280f363c860
f62f048fbb29a755631380c91cebeeb8a86d7e046221795bd70baccdfa86dc2e
f6734f8177112c0839b961f96d813fcb189d81b60e96c33278c1983b6f419615
f933a7ccf1a63317b347fa1e0769965a4f1c063df3e8e617a53ddf219808981d