chronopostweb.net
Open in
urlscan Pro
174.141.231.54
Malicious Activity!
Public Scan
Effective URL: https://chronopostweb.net/information-colis/BIbAZTGkMv4122/
Submission: On March 04 via api from BE — Scanned from DE
Summary
TLS certificate: Issued by R3 on February 20th 2022. Valid for: 3 months.
This is the only time chronopostweb.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Chronopost (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 11 | 174.141.231.54 174.141.231.54 | 32613 (IWEB-AS) (IWEB-AS) | |
3 | 2606:4700:303... 2606:4700:3033::ac43:c56d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 52.218.244.136 52.218.244.136 | () () | |
17 | 6 |
ASN32613 (IWEB-AS, CA)
PTR: earth.networxhost.com
securemoncompte.com | |
chronopostweb.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
chronopostweb.net
2 redirects
chronopostweb.net |
57 KB |
3 |
fontawesome.com
kit-free.fontawesome.com — Cisco Umbrella Rank: 22428 |
166 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 194 |
33 KB |
1 |
amazonaws.com
s3-us-west-2.amazonaws.com |
|
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 251 |
31 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2181 |
25 KB |
1 |
securemoncompte.com
securemoncompte.com |
386 B |
17 | 7 |
Domain | Requested by | |
---|---|---|
10 | chronopostweb.net |
2 redirects
chronopostweb.net
|
3 | kit-free.fontawesome.com |
chronopostweb.net
kit-free.fontawesome.com |
2 | cdnjs.cloudflare.com |
chronopostweb.net
|
1 | s3-us-west-2.amazonaws.com |
chronopostweb.net
|
1 | ajax.googleapis.com |
chronopostweb.net
|
1 | stackpath.bootstrapcdn.com |
chronopostweb.net
|
1 | securemoncompte.com | |
17 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
securemoncompte.com R3 |
2022-02-22 - 2022-05-23 |
3 months | crt.sh |
chronopostweb.net R3 |
2022-02-20 - 2022-05-21 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-07-08 - 2022-07-07 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-02-17 - 2022-05-12 |
3 months | crt.sh |
*.s3-us-west-2.amazonaws.com Amazon |
2021-12-17 - 2022-11-29 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://chronopostweb.net/information-colis/BIbAZTGkMv4122/
Frame ID: 319837C2837CC2CAE5B71E311603E108
Requests: 17 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://securemoncompte.com/ Page URL
-
https://chronopostweb.net/information-colis/
HTTP 302
https://chronopostweb.net/information-colis/BIbAZTGkMv4122 HTTP 301
https://chronopostweb.net/information-colis/BIbAZTGkMv4122/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://securemoncompte.com/ Page URL
-
https://chronopostweb.net/information-colis/
HTTP 302
https://chronopostweb.net/information-colis/BIbAZTGkMv4122 HTTP 301
https://chronopostweb.net/information-colis/BIbAZTGkMv4122/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
securemoncompte.com/ |
175 B 386 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
chronopostweb.net/information-colis/BIbAZTGkMv4122/ Redirect Chain
|
8 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
kit-free.fontawesome.com/releases/latest/css/ |
59 KB 13 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.0/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.4.1/ |
86 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chronopost_logo.png
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/img/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chronopost_tours_03712200_113425863.jpg
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/img/ |
14 KB 14 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chronopost_if.js
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.1/ |
85 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.inputmask.bundle.js
s3-us-west-2.amazonaws.com/s.cdpn.io/3/ |
50 KB 0 |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Capture.png
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dpd-logo.png
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chronopost_logo_small.png
chronopostweb.net/information-colis/BIbAZTGkMv4122/sourceApp/img/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-fa-solid-900.woff2
kit-free.fontawesome.com/releases/latest/webfonts/ |
76 KB 77 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
free-fa-brands-400.woff2
kit-free.fontawesome.com/releases/latest/webfonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Chronopost (Transportation)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| structuredClone object| oncontextlost object| oncontextrestored function| $ function| jQuery function| validateForm function| myFunction1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
chronopostweb.net/ | Name: PHPSESSID Value: po0d3veg858tpelkl3ef96j84c |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdnjs.cloudflare.com
chronopostweb.net
kit-free.fontawesome.com
s3-us-west-2.amazonaws.com
securemoncompte.com
stackpath.bootstrapcdn.com
174.141.231.54
2606:4700:3033::ac43:c56d
2606:4700::6810:125e
2606:4700::6812:acf
2a00:1450:4001:829::200a
52.218.244.136
0925e8ad7bd971391a8b1e98be8e87a6971919eb5b60c196485941c3c1df089a
1cbfd3959406f3f878e6f64133e4d7baece38558bbbcee1a11a0a2d8ee1b8352
2309a3b42db8684ed57dce9e29ed418477acb7740b979a15004f3e1f28b5e5ca
277b3d7509e18a5853b95de911547f1453ad45c201bee91ccdc814d8441ddf11
680af6669abc319f9803f0fa26d443df1b6bc29133d88a8e4bea560ffed7288c
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
8438891209c66b0dfd2e393cf589ca6a51197de737817d88bebb1dee67d63074
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf
a1d4dc7ed12cbd39ab6e8d1f572312c75c1051047a0c5b40b78721c6f6f4f934
ad0e79376d3a17afcef8306e5025d805a9e252eb31d2c56fa510cfe5851e8d42
b5bd9e64eea624aa2343f918af01f093ec4f2df1ca74b77eb1e10eecd596b336
b5be0732ab1cc16692e165a7950810f0c772e400f6a2f63e1026a0b938016813
bc5fa15b90d078322fac07419dbce0372e156a38d69c6b3abc38bf29ad476b32
c5dd43f53f3af822cbf17b1fb75f46192cdbd51724f277acf6cf0dacb3fd57e7
da57dc49cead7b4086ff694743bd877465f6b3393528e3c3aaaacad126965596
fc5128dfdcdfa0c3a9967a6d2f19399d7bf1aaae6ad7571b96b03915a1f30dda