![](/screenshots/0a921eb9-e1f7-4b7c-bcfd-ed3b3a2f116b.png)
paypal-gb.check-id421.com
Open in
urlscan Pro
104.21.15.14
Malicious Activity!
Public Scan
Submission Tags: tweet @noladefense #phishing #infosec #cybersecurity #フィッシング詐欺 #paypal Search All
Submission: On March 27 via api from FI — Scanned from GB
Summary
TLS certificate: Issued by GTS CA 1P5 on February 10th 2023. Valid for: 3 months.
This is the only time paypal-gb.check-id421.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 104.21.15.14 104.21.15.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 192.229.221.25 192.229.221.25 | 15133 (EDGECAST) (EDGECAST) | |
9 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
check-id421.com
paypal-gb.check-id421.com |
19 KB |
4 |
paypalobjects.com
www.paypalobjects.com — Cisco Umbrella Rank: 2236 |
152 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
5 | paypal-gb.check-id421.com |
paypal-gb.check-id421.com
|
4 | www.paypalobjects.com |
paypal-gb.check-id421.com
|
9 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.check-id421.com GTS CA 1P5 |
2023-02-10 - 2023-05-11 |
3 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2022-11-09 - 2023-12-10 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://paypal-gb.check-id421.com/pages
Frame ID: 9979CC5ACE5B56292C5BC4420105FF47
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pages
paypal-gb.check-id421.com/ |
51 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
front_end_filescontextualLoginElementalUIv2.css
paypal-gb.check-id421.com/front_end/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
paypal-gb.check-id421.com/front_end/front_end_files/ |
36 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
front_end_filesicon-PN-check.png
paypal-gb.check-id421.com/front_end/ |
0 278 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
front_end_filesglyph_alert_critical_big-2x.png
paypal-gb.check-id421.com/front_end/ |
0 280 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-mark-color.svg
www.paypalobjects.com/paypal-ui/logos/svg/ |
1 KB 924 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Regular.woff2
www.paypalobjects.com/paypal-ui/fonts/ |
25 KB 25 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_countries_flag4.png
www.paypalobjects.com/webstatic/mktg/icons/ |
108 KB 108 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Medium.woff2
www.paypalobjects.com/paypal-ui/fonts/ |
18 KB 18 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
paypal-gb.check-id421.com/ | Name: PHPSESSID Value: ci5cjjett69fj9nqc47dmuc2ii |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paypal-gb.check-id421.com
www.paypalobjects.com
104.21.15.14
192.229.221.25
13afe6a0d0ebc11796b6a3e975c781a13688beb5019a87ba31f72ca5704756e3
1f70ff447ed799a34f4c3ae37ef1f49ed4af71123ba2c2aefe354565354284be
21f89c7c27f0eab13388645aea1eedb4a342c06333a14d74c1a10dfca04d6455
2ae6779c6c3579643ab6deb5cfb822e843bf637d006a4ec25d9857ec7fb6d8c1
457f4e1752beef0cb80a32e33596303c45203f59418ce950104b44f472f3e453
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f9035e34f5734e89ddb03b601b1c0fd58323a93f176c5c7e220d7aa7a2062ed5