frimousses.le-pic.org
Open in
urlscan Pro
2001:4b98:dc0:47:216:3eff:fec8:b67f
Malicious Activity!
Public Scan
Effective URL: https://frimousses.le-pic.org/wp-content/uploads/b/login/?id=2327&utm_term=2327&utm_campaign=mail&utm_medium=inbox&utm_source=...
Submission: On March 04 via automatic, source openphish
Summary
TLS certificate: Issued by R3 on February 10th 2021. Valid for: 3 months.
This is the only time frimousses.le-pic.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: 1&1 Ionos (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2001:4b98:dc0... 2001:4b98:dc0:47:216:3eff:fec8:b67f | 29169 (GANDI-AS ...) (GANDI-AS Domain name registrar - http://www.gandi.net) | |
6 | 213.165.66.58 213.165.66.58 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 | 74.208.255.201 74.208.255.201 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
8 | 3 |
ASN29169 (GANDI-AS Domain name registrar - http://www.gandi.net, FR)
frimousses.le-pic.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
uicdn.net
ce1.uicdn.net |
285 KB |
2 |
le-pic.org
1 redirects
frimousses.le-pic.org |
6 KB |
1 |
ionos.com
mail.ionos.com |
8 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | ce1.uicdn.net |
frimousses.le-pic.org
ce1.uicdn.net |
2 | frimousses.le-pic.org | 1 redirects |
1 | mail.ionos.com |
frimousses.le-pic.org
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.le-pic.org R3 |
2021-02-10 - 2021-05-11 |
3 months | crt.sh |
ce1.uicdn.net GeoTrust RSA CA 2018 |
2020-03-03 - 2022-03-08 |
2 years | crt.sh |
mail.ionos.com GeoTrust EV RSA CA 2018 |
2020-11-05 - 2021-11-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://frimousses.le-pic.org/wp-content/uploads/b/login/?id=2327&utm_term=2327&utm_campaign=mail&utm_medium=inbox&utm_source=login_frontend_hosting&utm_err=0
Frame ID: C337201DEC4C4BAB5C8CD953126A50FC
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://frimousses.le-pic.org/wp-content/uploads/b/?email=abuse@ionos.com
HTTP 302
https://frimousses.le-pic.org/wp-content/uploads/b/login/?id=2327&utm_term=2327&utm_campaign=mail&utm_medi... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://frimousses.le-pic.org/wp-content/uploads/b/?email=abuse@ionos.com
HTTP 302
https://frimousses.le-pic.org/wp-content/uploads/b/login/?id=2327&utm_term=2327&utm_campaign=mail&utm_medium=inbox&utm_source=login_frontend_hosting&utm_err=0 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
frimousses.le-pic.org/wp-content/uploads/b/login/ Redirect Chain
|
17 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionos.min.css
ce1.uicdn.net/exos/framework/1.1/ |
186 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.min.css
mail.ionos.com/css/ |
15 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
exos-icon-font.woff
ce1.uicdn.net/exos/icons/ |
48 KB 48 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 63 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-regular.woff
ce1.uicdn.net/exos/fonts/overpass/ |
42 KB 42 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-bold.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 62 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-bold.woff
ce1.uicdn.net/exos/fonts/overpass/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: 1&1 Ionos (Telecommunication)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
frimousses.le-pic.org/ | Name: PHPSESSID Value: 3n8cat5n8n27e8cd4c5asv6ji7 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ce1.uicdn.net
frimousses.le-pic.org
mail.ionos.com
2001:4b98:dc0:47:216:3eff:fec8:b67f
213.165.66.58
74.208.255.201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