connexionpostalclient.firebaseapp.com Open in urlscan Pro
2620:0:890::100  Malicious Activity! Public Scan

URL: https://connexionpostalclient.firebaseapp.com/
Submission: On May 12 via api from JP — Scanned from JP

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 2620:0:890::100, located in United States and belongs to FASTLY, US. The main domain is connexionpostalclient.firebaseapp.com.
TLS certificate: Issued by GTS CA 1D4 on April 18th 2022. Valid for: 3 months.
This is the only time connexionpostalclient.firebaseapp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Banque Postale (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2620:0:890::100 54113 (FASTLY)
1 185.16.252.161 35676 (LA-POSTE)
2 2 81.80.208.143 3215 (France Te...)
2 81.80.208.9 3215 (France Te...)
4 3
Apex Domain
Subdomains
Transfer
4 gmf.fr
espace-assure.gmf.fr
statique.gmf.fr
7 KB
1 labanquepostale.fr
www.labanquepostale.fr — Cisco Umbrella Rank: 300370
4 KB
1 firebaseapp.com
connexionpostalclient.firebaseapp.com
2 KB
4 3
Domain Requested by
2 statique.gmf.fr connexionpostalclient.firebaseapp.com
2 espace-assure.gmf.fr 2 redirects
1 www.labanquepostale.fr connexionpostalclient.firebaseapp.com
1 connexionpostalclient.firebaseapp.com
4 4

This site contains links to these domains. Also see Links.

Domain
flocko.be
Subject Issuer Validity Valid
firebaseapp.com
GTS CA 1D4
2022-04-18 -
2022-07-17
3 months crt.sh
www.labanquepostale.fr
DigiCert SHA2 Extended Validation Server CA
2020-07-08 -
2022-07-09
2 years crt.sh

This page contains 1 frames:

Primary Page: https://connexionpostalclient.firebaseapp.com/
Frame ID: 942CFF5F8EB5F74399169C4AADD4D3F3
Requests: 4 HTTP requests in this frame

Screenshot


Page Statistics

4
Requests

50 %
HTTPS

25 %
IPv6

3
Domains

4
Subdomains

3
IPs

2
Countries

12 kB
Transfer

15 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 1
  • https://espace-assure.gmf.fr/commun/images/mail/editique/mail_telephone.jpg HTTP 302
  • https://statique.gmf.fr/commun/images/mail/editique/mail_telephone.jpg
Request Chain 2
  • https://espace-assure.gmf.fr/commun/images/mail/editique/mail_localiser_agence.jpg HTTP 302
  • https://statique.gmf.fr/commun/images/mail/editique/mail_localiser_agence.jpg

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
connexionpostalclient.firebaseapp.com/
5 KB
2 KB
Document
General
Full URL
https://connexionpostalclient.firebaseapp.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2620:0:890::100 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
846d4f9c97e53802a6a1db7b0ac863264c3da11afc60c7be39efac6cd1cc0ad3
Security Headers
Name Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

accept-ranges
bytes
cache-control
max-age=3600
content-encoding
br
content-length
1404
content-type
text/html; charset=utf-8
date
Thu, 12 May 2022 03:18:29 GMT
etag
"9ed83f1c0bcb2645594759d6df01b037b5f54b2b2d93f871fcc5564ca9870eb9-br"
last-modified
Tue, 10 May 2022 21:51:00 GMT
strict-transport-security
max-age=31556926; includeSubDomains; preload
vary
x-fh-requested-host, accept-encoding
x-cache
HIT
x-cache-hits
1
x-served-by
cache-hnd18735-HND
x-timer
S1652325509.382777,VS0,VE1
LOGO-LBP-digital-fd-clair-RVB.svg
www.labanquepostale.fr/content/dam/lbp/images/logo/la-banque-postale/
3 KB
4 KB
Image
General
Full URL
https://www.labanquepostale.fr/content/dam/lbp/images/logo/la-banque-postale/LOGO-LBP-digital-fd-clair-RVB.svg
Requested by
Host: connexionpostalclient.firebaseapp.com
URL: https://connexionpostalclient.firebaseapp.com/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_CBC
Server
185.16.252.161 , France, ASN35676 (LA-POSTE, FR),
Reverse DNS
www.labanquepostale.fr
Software
/
Resource Hash
739104b5349ad414323b0f821b747b55af29af684d47f6c6a189edb08b76b4e3
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://connexionpostalclient.firebaseapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36

Response headers

X-Dispatcher
dispatcher
Date
Thu, 12 May 2022 03:18:30 GMT
X-Content-Type-Options
nosniff
Last-Modified
Mon, 28 Feb 2022 17:17:45 GMT
Age
66
ETag
"dd1-5d9173a0da040"
X-Vhost
publish
Vary
Accept-Encoding,User-Agent
Content-Type
image/svg+xml
Content-Disposition
attachment; filename="LOGO-LBP-digital-fd-clair-RVB.svg"
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
3537
mail_telephone.jpg
statique.gmf.fr/commun/images/mail/editique/
Redirect Chain
  • https://espace-assure.gmf.fr/commun/images/mail/editique/mail_telephone.jpg
  • https://statique.gmf.fr/commun/images/mail/editique/mail_telephone.jpg
4 KB
4 KB
Image
General
Full URL
https://statique.gmf.fr/commun/images/mail/editique/mail_telephone.jpg
Requested by
Host: connexionpostalclient.firebaseapp.com
URL: https://connexionpostalclient.firebaseapp.com/
Protocol
HTTP/1.1
Server
81.80.208.9 Courbevoie, France, ASN3215 (France Telecom - Orange, FR),
Reverse DNS
Software
Apache /
Resource Hash
af450b4c4cc261252e529bea96cc645e18c9165d7214e98b85e8f3ca7cd200b9

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://connexionpostalclient.firebaseapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36

Response headers

Date
Thu, 12 May 2022 03:18:31 GMT
Last-Modified
Thu, 21 Apr 2022 20:16:25 GMT
Server
Apache
Vary
User-Agent
Content-Type
image/jpeg
Cache-Control
max-age=2592000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=494
Content-Length
3631
Expires
Sat, 11 Jun 2022 03:18:31 GMT

Redirect headers

Location
https://statique.gmf.fr/commun/images/mail/editique/mail_telephone.jpg
Server
BigIP
Connection
Keep-Alive
Content-Length
0
mail_localiser_agence.jpg
statique.gmf.fr/commun/images/mail/editique/
Redirect Chain
  • https://espace-assure.gmf.fr/commun/images/mail/editique/mail_localiser_agence.jpg
  • https://statique.gmf.fr/commun/images/mail/editique/mail_localiser_agence.jpg
2 KB
3 KB
Image
General
Full URL
https://statique.gmf.fr/commun/images/mail/editique/mail_localiser_agence.jpg
Requested by
Host: connexionpostalclient.firebaseapp.com
URL: https://connexionpostalclient.firebaseapp.com/
Protocol
HTTP/1.1
Server
81.80.208.9 Courbevoie, France, ASN3215 (France Telecom - Orange, FR),
Reverse DNS
Software
Apache /
Resource Hash
d52229e1305c2edc39aafc89c7afa957127d883ff1eb1a77f1dcfe4f3201be3a

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://connexionpostalclient.firebaseapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/101.0.4951.64 Safari/537.36

Response headers

Date
Thu, 12 May 2022 03:18:31 GMT
Last-Modified
Thu, 21 Apr 2022 20:14:27 GMT
Server
Apache
Vary
User-Agent
Content-Type
image/jpeg
Cache-Control
max-age=2592000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=493
Content-Length
2390
Expires
Sat, 11 Jun 2022 03:18:31 GMT

Redirect headers

Location
https://statique.gmf.fr/commun/images/mail/editique/mail_localiser_agence.jpg
Server
BigIP
Connection
Keep-Alive
Content-Length
0

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Banque Postale (Banking)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31556926; includeSubDomains; preload