solutionscitoyennes.net Open in urlscan Pro
2a06:98c1:3121::3  Malicious Activity! Public Scan

URL: https://solutionscitoyennes.net/tink-moneyflo/lbp/857204781693/578934/login.php
Submission: On October 06 via api from JP — Scanned from NL

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a06:98c1:3121::3, located in United States and belongs to CLOUDFLARENET, US. The main domain is solutionscitoyennes.net.
TLS certificate: Issued by GTS CA 1P5 on September 20th 2023. Valid for: 3 months.
This is the only time solutionscitoyennes.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Banque Postale (Banking)

Domain & IP information

IP Address AS Autonomous System
1 2a06:98c1:312... 13335 (CLOUDFLAR...)
1 2
Apex Domain
Subdomains
Transfer
1 solutionscitoyennes.net
solutionscitoyennes.net
702 KB
1 1
Domain Requested by
1 solutionscitoyennes.net
1 1

This site contains no links.

Subject Issuer Validity Valid
solutionscitoyennes.net
GTS CA 1P5
2023-09-20 -
2023-12-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://solutionscitoyennes.net/tink-moneyflo/lbp/857204781693/578934/login.php
Frame ID: CB027677BA5B4A9466C66FBEDB963495
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

Connexion à l'espace client - La Banque Postale

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

1307 kB
Transfer

1907 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
solutionscitoyennes.net/tink-moneyflo/lbp/857204781693/578934/
1 MB
702 KB
Document
General
Full URL
https://solutionscitoyennes.net/tink-moneyflo/lbp/857204781693/578934/login.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a06:98c1:3121::3 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4558726270c907dc74c1148f61898469403a0f22274da5d292e6a463161fbcfe

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.149 Safari/537.36
accept-language
nl-NL,nl;q=0.9

Response headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
811af28bc87c2c1c-FRA
content-encoding
br
content-type
text/html; charset=UTF-8
date
Fri, 06 Oct 2023 03:51:44 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=1m%2F9ugvWQePEopeQvjYihnNapQGbl6BpHJsbyu6HmHVCA3ne4xGPrcb5a3ONcILkWoGOMBbl56pbqJUZjjxC67VQg76fk6xRlFNfWPj1DKu9S2OqCBT3bWo7jJWviUr2efcuq24SLiw%2BeciPVvTrnNW%2FX%2B8rNQ%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
vary
Accept-Encoding
truncated
/
8 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c6573f8959e56e6a621715af791a527f3da7dc0c1abd9377b83f991ccc85a91c

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.149 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
10 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a079710e67a906296308d3f4e23f6e8a1bfb326e926af1cf4feeec723c8d4674

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.149 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
6c2ecc8d8ed497ccfd5de46495d86ec26eb29234a7b65a48cb3bb60ea1519a0a

Request headers

accept-language
nl-NL,nl;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.149 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
302 KB
302 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0e56b17d142eb366c8007031d14e34da48c70b4a9d9a0ca492e696a7bae45e1e

Request headers

Referer
Origin
https://solutionscitoyennes.net
accept-language
nl-NL,nl;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.149 Safari/537.36

Response headers

Content-Type
application/x-font-woff
truncated
/
302 KB
302 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5b9025dda4d7688e3311b0c17eddc501133b807def33effaef6593843cf5416e

Request headers

Referer
Origin
https://solutionscitoyennes.net
accept-language
nl-NL,nl;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.149 Safari/537.36

Response headers

Content-Type
application/x-font-woff

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Banque Postale (Banking)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader

0 Cookies