www.postfinance-ch.cf
Open in
urlscan Pro
51.83.70.240
Malicious Activity!
Public Scan
Effective URL: http://www.postfinance-ch.cf/61b467/caps.htm?acs=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e
Submission: On May 27 via api from GB
Summary
This is the only time www.postfinance-ch.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Swiss Post (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 11 | 51.83.70.240 51.83.70.240 | 16276 (OVH) (OVH) | |
1 | 35.189.114.2 35.189.114.2 | 15169 (GOOGLE) (GOOGLE - Google LLC) | |
10 | 2 |
ASN15169 (GOOGLE - Google LLC, US)
PTR: 2.114.189.35.bc.googleusercontent.com
www.blablaconnect.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
postfinance-ch.cf
2 redirects
www.postfinance-ch.cf |
87 KB |
1 |
blablaconnect.com
www.blablaconnect.com |
24 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
11 | www.postfinance-ch.cf |
2 redirects
www.postfinance-ch.cf
|
1 | www.blablaconnect.com |
www.postfinance-ch.cf
|
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
acs.swisscard.ch |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.blablaconnect.com COMODO RSA Domain Validation Secure Server CA |
2016-04-18 - 2019-06-17 |
3 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.postfinance-ch.cf/61b467/caps.htm?acs=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e
Frame ID: BAC7E9873DEBCE2AB093DA800BB35F55
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.postfinance-ch.cf/
HTTP 302
http://www.postfinance-ch.cf/61b467 HTTP 301
http://www.postfinance-ch.cf/61b467/ Page URL
- http://www.postfinance-ch.cf/61b467/caps.htm?acs=_connect-run&secure=5540zef1415405412104ef151511d7f84f5z... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /modernizr(?:-([\d.]*[\d]))?.*\.js/i
- env /^Modernizr$/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Besonderen Bestimmungen der PostFinance AG für die Benützung von 3-D Secure.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.postfinance-ch.cf/
HTTP 302
http://www.postfinance-ch.cf/61b467 HTTP 301
http://www.postfinance-ch.cf/61b467/ Page URL
- http://www.postfinance-ch.cf/61b467/caps.htm?acs=_connect-run&secure=5540zef1415405412104ef151511d7f84f5ze1f510eec8bd0e Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.postfinance-ch.cf/ HTTP 302
- http://www.postfinance-ch.cf/61b467 HTTP 301
- http://www.postfinance-ch.cf/61b467/
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
www.postfinance-ch.cf/61b467/ Redirect Chain
|
227 B 433 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
caps.htm
www.postfinance-ch.cf/61b467/ |
15 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
normalize.css
www.postfinance-ch.cf/61b467/cap_fichiers/ |
2 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.postfinance-ch.cf/61b467/cap_fichiers/ |
8 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modernizr.js
www.postfinance-ch.cf/61b467/cap_fichiers/ |
15 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
EASy_Logo_small_de.png
www.postfinance-ch.cf/61b467/cap_fichiers/ |
19 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
verified_visa_mastercard.svg
www.blablaconnect.com/wp-content/themes/cleanblog-master/front-page/img/ |
57 KB 24 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
info-sign.png
www.postfinance-ch.cf/61b467/cap_fichiers/ |
287 B 528 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
x-out.js
www.postfinance-ch.cf/61b467/cap_fichiers/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
minified.js
www.postfinance-ch.cf/61b467/cap_fichiers/ |
20 KB 21 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Swiss Post (Transportation)44 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| html5 object| Modernizr function| yepnope boolean| CAPTURE_XOUT boolean| TRAP_RIGHT_CLICK number| KEY_F5 number| KEY_LEFT number| KEY_HOME number| KEY_R number| BTN_RIGHT boolean| isNS boolean| isIE boolean| isNS4 string| formTags function| gatherFormData function| onUnloadHandler function| OnClickHandler function| onDocClick function| onDocKeyDown function| require function| define boolean| refreshing boolean| navigating boolean| closing boolean| IsCancelButton string| screenLang string| calloutData string| custData function| onPageInit function| onFocusHandler object| loadError function| objError function| onUserInput function| initExpiryMonth function| initExpiryYear function| initForm function| onLocaleChange function| keyPress function| OnLocaleChange object| MINI function| $0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.blablaconnect.com
www.postfinance-ch.cf
35.189.114.2
51.83.70.240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