epic-servers.com
Open in
urlscan Pro
162.144.18.71
Malicious Activity!
Public Scan
Submission: On September 30 via automatic, source phishtank
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on August 11th 2018. Valid for: 3 months.
This is the only time epic-servers.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 162.144.18.71 162.144.18.71 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
4 | 2.20.22.134 2.20.22.134 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
15 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: 162-144-18-71.unifiedlayer.com
epic-servers.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a2-20-22-134.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
epic-servers.com
epic-servers.com |
341 KB |
4 |
paypalobjects.com
www.paypalobjects.com |
169 KB |
15 | 2 |
Domain | Requested by | |
---|---|---|
11 | epic-servers.com |
epic-servers.com
|
4 | www.paypalobjects.com |
epic-servers.com
|
15 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
fallenlegacy.net Let's Encrypt Authority X3 |
2018-08-11 - 2018-11-09 |
3 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://epic-servers.com/slider/css/re4a/Confirm/websc_info/
Frame ID: 1F173BCE49134261FBC5F009362CD2C9
Requests: 15 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
epic-servers.com/slider/css/re4a/Confirm/websc_info/ |
9 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
G-Z118.css
epic-servers.com/slider/css/re4a/lib/css/ |
210 KB 37 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
B-Z118.css
epic-servers.com/slider/css/re4a/lib/css/ |
763 B 648 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
epic-servers.com/slider/css/re4a/lib/js/ |
84 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.js
epic-servers.com/slider/css/re4a/lib/js/ |
45 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.v-form.js
epic-servers.com/slider/css/re4a/lib/js/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
epic-servers.com/slider/css/re4a/lib/js/ |
18 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
signup_default.jpg
epic-servers.com/slider/css/re4a/lib/img/ |
203 KB 203 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite_countries_flag4.png
www.paypalobjects.com/webstatic/mktg/icons/ |
68 KB 69 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
onboarding_form.png
epic-servers.com/slider/css/re4a/lib/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
PayPalSansSmall-Regular.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
46 KB 47 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
onboarding_form.png
www.paypalobjects.com/webstatic/i/consumer/onboarding/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
superbowlAsset.png
epic-servers.com/slider/css/re4a/lib/img/ |
26 KB 27 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ppcom-white.svg
epic-servers.com/slider/css/re4a/lib/img/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
PayPalSansSmall-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
46 KB 46 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
epic-servers.com/ | Name: PHPSESSID Value: 115fda9a98adcaefc91c017f898a98d8 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
epic-servers.com
www.paypalobjects.com
162.144.18.71
2.20.22.134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