URL: https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
Submission: On January 14 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 6 HTTP transactions. The main IP is 192.185.149.50, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is www.paypalverification.allgamescheaper.com.
TLS certificate: Issued by R3 on December 14th 2020. Valid for: 3 months.
This is the only time www.paypalverification.allgamescheaper.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online) PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
6 192.185.149.50 46606 (UNIFIEDLA...)
6 1
Domain
Subdomains
Transfer
6 allgamescheaper.com
61 KB
6 1
Domain Requested by
6 www.paypalverification.allgamescheaper.com www.paypalverification.allgamescheaper.com
6 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
paypalverification.allgamescheaper.com
R3
2020-12-14 -
2021-03-14
3 months

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i


Stats

0
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
?country.x=ch&amp
/myaccount/websc_login
7 KB
6 KB
Document
General
Full URL
https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.149.50 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-149-50.unifiedlayer.com
Software
Apache /
Resource Hash
e20449ee4d35c5a82510ffc568b857dbab9fbd629d7f79819606473127d444e5

Request headers

:method
GET
:authority
www.paypalverification.allgamescheaper.com
:scheme
https
:path
/myaccount/websc_login/?country.x=ch&amp
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 14 Jan 2021 01:17:11 GMT
server
Apache
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
set-cookie
PHPSESSID=1974dc7a708c7062cc3c9c014a545cd7; path=/
vary
Accept-Encoding
content-encoding
gzip
content-length
5626
content-type
text/html; charset=UTF-8
hok.js
/myaccount/websc_login
20 KB
8 KB
Script
General
Full URL
https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/hok.js
Requested by
Host: www.paypalverification.allgamescheaper.com
URL: https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.149.50 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-149-50.unifiedlayer.com
Software
Apache /
Resource Hash
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8

Request headers

Referer
https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 14 Jan 2021 01:17:12 GMT
content-encoding
gzip
last-modified
Sat, 18 Mar 2017 00:42:12 GMT
server
Apache
vary
Accept-Encoding
content-type
application/javascript
accept-ranges
bytes
content-length
7931
sign_in.css
/myaccount/css
24 KB
7 KB
Stylesheet
General
Full URL
https://www.paypalverification.allgamescheaper.com/myaccount/css/sign_in.css
Requested by
Host: www.paypalverification.allgamescheaper.com
URL: https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.149.50 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-149-50.unifiedlayer.com
Software
Apache /
Resource Hash
3290055cafa251475adbc5c824826b7848e8ed89133d3dbc73c63a0a841a1ac0

Request headers

Referer
https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 14 Jan 2021 01:17:12 GMT
content-encoding
gzip
last-modified
Sat, 18 Mar 2017 00:42:12 GMT
server
Apache
vary
Accept-Encoding
content-type
text/css
accept-ranges
bytes
content-length
7392
jqury.js
/myaccount/js
84 KB
37 KB
Script
General
Full URL
https://www.paypalverification.allgamescheaper.com/myaccount/js/jqury.js
Requested by
Host: www.paypalverification.allgamescheaper.com
URL: https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.149.50 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-149-50.unifiedlayer.com
Software
Apache /
Resource Hash
2a1f1370eb7b24a307312112427dfd544fb838a8bef66babc936f5e870a22e52

Request headers

Referer
https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 14 Jan 2021 01:17:12 GMT
content-encoding
gzip
last-modified
Sat, 18 Mar 2017 00:42:12 GMT
server
Apache
accept-ranges
bytes
vary
Accept-Encoding
content-type
application/javascript
login.js
/myaccount/js
910 B
387 B
Script
General
Full URL
https://www.paypalverification.allgamescheaper.com/myaccount/js/login.js
Requested by
Host: www.paypalverification.allgamescheaper.com
URL: https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.149.50 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-149-50.unifiedlayer.com
Software
Apache /
Resource Hash
92dd48f0faf17873c9b9f3ae2a1000d819225627ee4f1475ca54bd496f82dbdb

Request headers

Referer
https://www.paypalverification.allgamescheaper.com/myaccount/websc_login/?country.x=ch&amp
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 14 Jan 2021 01:17:12 GMT
content-encoding
gzip
last-modified
Sat, 18 Mar 2017 00:42:12 GMT
server
Apache
vary
Accept-Encoding
content-type
application/javascript
accept-ranges
bytes
content-length
355
logins.PNG
/myaccount/img
2 KB
2 KB
Image
General
Full URL
https://www.paypalverification.allgamescheaper.com/myaccount/img/logins.PNG
Requested by
Host: www.paypalverification.allgamescheaper.com
URL: https://www.paypalverification.allgamescheaper.com/myaccount/css/sign_in.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.149.50 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-149-50.unifiedlayer.com
Software
Apache /
Resource Hash
49bb344cab7bb90d18d29713e6bdf6196160d55fb775f8e27ddf28fac3ce60ed

Request headers

Referer
https://www.paypalverification.allgamescheaper.com/myaccount/css/sign_in.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 14 Jan 2021 01:17:13 GMT
last-modified
Sat, 18 Mar 2017 00:42:12 GMT
server
Apache
accept-ranges
bytes
content-length
1958
content-type
image/png

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online) PayPal (Financial)

21 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt function| $ function| jQuery function| disableselect function| reEnable function| clickIE

1 Cookies

Domain/Path Name / Value
www.paypalverification.allgamescheaper.com/ Name: PHPSESSID
Value: 1974dc7a708c7062cc3c9c014a545cd7