paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com Open in urlscan Pro
162.243.142.234  Malicious Activity! Public Scan

Submitted URL: https://rebrand.ly/n8vtnud4m2eppb65ea
Effective URL: https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html
Submission Tags: phishing malicious Search All
Submission: On February 25 via api from US

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 162.243.142.234, located in San Francisco, United States and belongs to DIGITALOCEAN-ASN, US. The main domain is paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com.
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on August 19th 2020. Valid for: a year.
This is the only time paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 54.81.48.211 14618 (AMAZON-AES)
1 162.243.142.234 14061 (DIGITALOC...)
1 2
Apex Domain
Subdomains
Transfer
1 codeanyapp.com
paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com
290 KB
1 rebrand.ly
rebrand.ly
356 B
1 2

This site contains no links.

Subject Issuer Validity Valid
*.codeanyapp.com
Sectigo RSA Domain Validation Secure Server CA
2020-08-19 -
2021-08-20
a year crt.sh

This page contains 1 frames:

Primary Page: https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html
Frame ID: 843B0B120FE79ABE824867AF837FFC2C
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://rebrand.ly/n8vtnud4m2eppb65ea HTTP 301
    https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

290 kB
Transfer

294 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://rebrand.ly/n8vtnud4m2eppb65ea HTTP 301
    https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin.html
paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/
Redirect Chain
  • https://rebrand.ly/n8vtnud4m2eppb65ea
  • https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html
289 KB
290 KB
Document
General
Full URL
https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
162.243.142.234 San Francisco, United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
sfo5.codeanyproxy.com
Software
openresty/1.13.6.2 /
Resource Hash
f74bdf558d0ea4cc13b165092219545d9c264a070b3b692d6baf5aaf2f4e5399

Request headers

:method
GET
:authority
paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com
:scheme
https
:path
/signin.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

server
openresty/1.13.6.2
date
Thu, 25 Feb 2021 01:19:55 GMT
content-type
text/html; charset=UTF-8
content-length
295942
last-modified
Wed, 24 Feb 2021 23:22:01 GMT
etag
"48406-5bc1d4d62670a"
accept-ranges
bytes

Redirect headers

Cache-Control
no-cache, no-store
Date
Thu, 25 Feb 2021 01:56:12 GMT
Engine
Rebrandly.redirect, version 2.1
Expires
-1
Location
https://paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com/signin.html
Server
Kestrel
Strict-Transport-Security
max-age=15552000
Content-Length
0
Connection
keep-alive
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3d6fd1d01b7b8800c81c9557eab05a0ca5858483c426e0ba9bdca515dd7b2521

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

paypal-com-profile-review-8rn2ruqk-info14009.codeanyapp.com
rebrand.ly
162.243.142.234
54.81.48.211
3d6fd1d01b7b8800c81c9557eab05a0ca5858483c426e0ba9bdca515dd7b2521
f74bdf558d0ea4cc13b165092219545d9c264a070b3b692d6baf5aaf2f4e5399