saber.irwebservice.ir
Open in
urlscan Pro
2606:4700:3031::ac43:b2c1
Malicious Activity!
Public Scan
Effective URL: https://saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/
Submission: On October 16 via api from BY — Scanned from US
Summary
TLS certificate: Issued by WE1 on October 9th 2024. Valid for: 3 months.
This is the only time saber.irwebservice.ir was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Banque Postale (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 2606:4700:303... 2606:4700:3031::ac43:b2c1 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
irwebservice.ir
saber.irwebservice.ir |
2 MB |
4 | 1 |
Domain | Requested by | |
---|---|---|
4 | saber.irwebservice.ir |
saber.irwebservice.ir
|
4 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
irwebservice.ir WE1 |
2024-10-09 - 2025-01-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/
Frame ID: 92F4307B3CAC61B4A2DB17745762FD35
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Connexion à l'espace client - La Banque PostalePage URL History Show full URLs
-
http://saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/
HTTP 307
https://saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/ Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/
HTTP 307
https://saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/ Redirect Chain
|
1 MB 690 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
speculation
saber.irwebservice.ir/cdn-cgi/ |
128 B 601 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
302 KB 302 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
302 KB 302 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
336 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/Pstl_files/ |
1 MB 693 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
10 KB 10 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logonew.png
saber.irwebservice.ir/wp-admin/banque-postale/pstl-log.php/Pstl_files/ |
1 MB 692 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Banque Postale (Banking)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
saber.irwebservice.ir
2606:4700:3031::ac43:b2c1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