moser.99-79-33-6.plesk.page
Open in
urlscan Pro
99.79.33.6
Malicious Activity!
Public Scan
Effective URL: https://moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/region.php?particulier
Submission: On September 26 via automatic, source openphish — Scanned from CA
Summary
TLS certificate: Issued by R3 on September 24th 2022. Valid for: 3 months.
This is the only time moser.99-79-33-6.plesk.page was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Credit Agricole (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 99.79.33.6 99.79.33.6 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:817::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2607:f8b0:400... 2607:f8b0:4006:81e::2003 | 15169 (GOOGLE) (GOOGLE) | |
15 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-99-79-33-6.ca-central-1.compute.amazonaws.com
moser.99-79-33-6.plesk.page |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
plesk.page
moser.99-79-33-6.plesk.page |
615 KB |
2 |
gstatic.com
fonts.gstatic.com |
91 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 40 |
2 KB |
15 | 3 |
Domain | Requested by | |
---|---|---|
12 | moser.99-79-33-6.plesk.page |
moser.99-79-33-6.plesk.page
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
moser.99-79-33-6.plesk.page
|
15 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
moser.99-79-33-6.plesk.page R3 |
2022-09-24 - 2022-12-23 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-09-05 - 2022-11-28 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-09-05 - 2022-11-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/region.php?particulier
Frame ID: FA2FF0F21259A1032A5FF6098ABBF3F8
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Accès CR - Crédit AgricolePage URL History Show full URLs
-
http://moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/region.php?particulier
HTTP 307
https://moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/region.php?particulier Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/region.php?particulier
HTTP 307
https://moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/region.php?particulier Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
region.php
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/27c8f41418f7658/ Redirect Chain
|
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/css/ |
138 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
helpers.css
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/css/ |
40 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts.css
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/css/ |
1 KB 381 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/css/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
calogo.png
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/images/ |
18 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/js/ |
86 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/js/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/js/ |
58 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome.js
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/js/ |
1 MB 352 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/js/ |
4 KB 1001 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
23 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
particuliers.jpg
moser.99-79-33-6.plesk.page/psd2-activation/psd2-activation/assets/images/ |
167 KB 167 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memvYaGs126MiZpBA-UvWbX2vVnXBbObj2OVTS-muw.woff2
fonts.gstatic.com/s/opensans/v34/ |
44 KB 44 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
memtYaGs126MiZpBA-UFUIcVXSCEkx2cmqvXlWqWuU6F.woff2
fonts.gstatic.com/s/opensans/v34/ |
47 KB 47 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Credit Agricole (Banking)21 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| Popper object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome boolean| isShift string| seperator string| dash function| cc_date function| date_of_birth1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
moser.99-79-33-6.plesk.page/ | Name: PHPSESSID Value: pkb36lbo67sjirsgratmimcrf9 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
moser.99-79-33-6.plesk.page
2607:f8b0:4006:817::200a
2607:f8b0:4006:81e::2003
99.79.33.6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