reconfigure-conduite.web.app
Open in
urlscan Pro
2620:0:890::100
Malicious Activity!
Public Scan
Effective URL: https://reconfigure-conduite.web.app/
Submission: On October 12 via manual from FR — Scanned from FR
Summary
TLS certificate: Issued by GTS CA 1D4 on September 11th 2023. Valid for: 3 months.
This is the only time reconfigure-conduite.web.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: FR Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 178.238.224.248 178.238.224.248 | 51167 (CONTABO) (CONTABO) | |
1 | 2620:0:890::100 2620:0:890::100 | 54113 (FASTLY) (FASTLY) | |
1 | 2a00:1450:400... 2a00:1450:4001:802::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2600:9000:249... 2600:9000:2491:9600:1e:5470:880:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2a00:1450:400... 2a00:1450:4001:80f::2003 | 15169 (GOOGLE) (GOOGLE) | |
6 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
unlayer.com
assets.unlayer.com — Cisco Umbrella Rank: 56345 |
189 KB |
1 |
gstatic.com
fonts.gstatic.com |
33 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 49 |
989 B |
1 |
web.app
reconfigure-conduite.web.app |
3 KB |
1 |
parg.co
1 redirects
parg.co |
107 B |
6 | 5 |
Domain | Requested by | |
---|---|---|
3 | assets.unlayer.com |
reconfigure-conduite.web.app
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
reconfigure-conduite.web.app
|
1 | reconfigure-conduite.web.app | |
1 | parg.co | 1 redirects |
6 | 5 |
Subject Issuer | Validity | Valid | |
---|---|---|---|
web.app GTS CA 1D4 |
2023-09-11 - 2023-12-10 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-09-18 - 2023-12-11 |
3 months | crt.sh |
assets.unlayer.com Amazon RSA 2048 M02 |
2023-04-22 - 2024-05-21 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-09-18 - 2023-12-11 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://reconfigure-conduite.web.app/
Frame ID: A4696E93481AA0FC1EE7CE03AC735C00
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://parg.co/UV7b
HTTP 301
https://reconfigure-conduite.web.app/ Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: RĂ©gulariser maintenant
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://parg.co/UV7b
HTTP 301
https://reconfigure-conduite.web.app/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
reconfigure-conduite.web.app/ Redirect Chain
|
26 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 989 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1677461358371-1677387472401-1677279758592-1676834940561-antai-top-1676670844549-1676150302676-aebd5b1fe-0e52-4589-a6a8-634883c62208.png
assets.unlayer.com/projects/138547/ |
70 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1677461366341-1677387536277-1677279766233-1676834933758-antai-mid-1676670863860-1676150006254-b29c8fb25-8996-4e8a-b418-6e31e35ebfc3.png
assets.unlayer.com/projects/138547/ |
49 KB 49 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1677461705891-1677387472401-1677279758592-1676834940561-antai-top-1676670844549-1676150302676-aebd5b1fe-0e52-4589-a6a8-634883c62208.png
assets.unlayer.com/projects/138547/ |
70 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
JTUSjIg1_i6t8kCHKm459Wlhyw.woff2
fonts.gstatic.com/s/montserrat/v26/ |
32 KB 33 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: FR Government (Government)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31556926; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
assets.unlayer.com
fonts.googleapis.com
fonts.gstatic.com
parg.co
reconfigure-conduite.web.app
178.238.224.248
2600:9000:2491:9600:1e:5470:880:93a1
2620:0:890::100
2a00:1450:4001:802::200a
2a00:1450:4001:80f::2003
8a127630e2c027f7554a1230c692365078a585a7ec7c7e872ffb73d2b0fea3f0
8bcc222003eb416d1d94ffe4a5357b411b2d7073a8e8aa381c23a13e7d5e6a36
9f432863c5ab1b06046dad2eb47b0171fd1601a468a3ab874f66ceed27be4c0f
bb2f90081933c0f2475883ca2c5cfee94e96d7314a09433fffc42e37f4cffd3b
cf27a0ae44d231a9e0713b7633944942ddb2d517fcef722954fe98582157c88a