paypal2.caughtgbpspp.com Open in urlscan Pro
108.167.183.74  Malicious Activity! Public Scan

URL: http://paypal2.caughtgbpspp.com/sd/validate.php
Submission: On June 17 via automatic, source openphish

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 10 HTTP transactions. The main IP is 108.167.183.74, located in Houston, United States and belongs to CYRUSONE - CyrusOne LLC, US. The main domain is paypal2.caughtgbpspp.com.
This is the only time paypal2.caughtgbpspp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
6 108.167.183.74 20013 (CYRUSONE)
4 95.101.242.48 16625 (AKAMAI-AS)
10 2
Apex Domain
Subdomains
Transfer
6 caughtgbpspp.com
paypal2.caughtgbpspp.com
78 KB
4 paypalobjects.com
www.paypalobjects.com
142 KB
10 2
Domain Requested by
6 paypal2.caughtgbpspp.com paypal2.caughtgbpspp.com
4 www.paypalobjects.com paypal2.caughtgbpspp.com
10 2

This site contains no links.

Subject Issuer Validity Valid
www.paypalobjects.com
Symantec Class 3 EV SSL CA - G3
2015-10-12 -
2017-09-02
2 years crt.sh

This page contains 1 frames:

Primary Page: http://paypal2.caughtgbpspp.com/sd/validate.php
Frame ID: 16827.1
Requests: 10 HTTP requests in this frame

Screenshot


Page Statistics

10
Requests

40 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

221 kB
Transfer

402 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request validate.php
paypal2.caughtgbpspp.com/sd/
5 KB
1 KB
Document
General
Full URL
http://paypal2.caughtgbpspp.com/sd/validate.php
Protocol
HTTP/1.1
Server
108.167.183.74 Houston, United States, ASN20013 (CYRUSONE - CyrusOne LLC, US),
Reverse DNS
Software
nginx/1.12.0 /
Resource Hash
f6ba9c0f9f312e1a3eeb477b35c728960df90ed39e9ec8b71fd4c5575e9cfcca

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Sat, 17 Jun 2017 09:22:11 GMT
Content-Encoding
gzip
Server
nginx/1.12.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
app2.css
paypal2.caughtgbpspp.com/sd/base/
74 KB
14 KB
Stylesheet
General
Full URL
http://paypal2.caughtgbpspp.com/sd/base/app2.css
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/validate.php
Protocol
HTTP/1.1
Server
108.167.183.74 Houston, United States, ASN20013 (CYRUSONE - CyrusOne LLC, US),
Reverse DNS
Software
nginx/1.12.0 /
Resource Hash
715b1c6da48e2ec0cfa12626695d67782248a7b527c0e8530f954c56651da71d

Request headers

Referer
http://paypal2.caughtgbpspp.com/sd/validate.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Sat, 17 Jun 2017 09:22:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 20 Dec 2016 16:21:08 GMT
Server
nginx/1.12.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/css
validationEngine.jquery.css
paypal2.caughtgbpspp.com/sd/base/valid8/css/
3 KB
920 B
Stylesheet
General
Full URL
http://paypal2.caughtgbpspp.com/sd/base/valid8/css/validationEngine.jquery.css
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/validate.php
Protocol
HTTP/1.1
Server
108.167.183.74 Houston, United States, ASN20013 (CYRUSONE - CyrusOne LLC, US),
Reverse DNS
Software
nginx/1.12.0 /
Resource Hash
7dcc1bdb50cc30f3fce1da2607c6982120b767c0e14d2dae6a668e7a6802ec7e

Request headers

Referer
http://paypal2.caughtgbpspp.com/sd/validate.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Sat, 17 Jun 2017 09:22:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Mar 2016 13:36:10 GMT
Server
nginx/1.12.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/css
jquery-1.8.2.min.js
paypal2.caughtgbpspp.com/sd/base/valid8/js/
91 KB
38 KB
Script
General
Full URL
http://paypal2.caughtgbpspp.com/sd/base/valid8/js/jquery-1.8.2.min.js
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/validate.php
Protocol
HTTP/1.1
Server
108.167.183.74 Houston, United States, ASN20013 (CYRUSONE - CyrusOne LLC, US),
Reverse DNS
Software
nginx/1.12.0 /
Resource Hash
f23d4b309b72743aa8afe1f8c98a25b3ee31246fa572c66d9d8cb1982cae4fbc

Request headers

Referer
http://paypal2.caughtgbpspp.com/sd/validate.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Sat, 17 Jun 2017 09:22:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Mar 2016 13:36:10 GMT
Server
nginx/1.12.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
application/javascript
jquery.validationEngine-en.js
paypal2.caughtgbpspp.com/sd/base/valid8/js/languages/
12 KB
3 KB
Script
General
Full URL
http://paypal2.caughtgbpspp.com/sd/base/valid8/js/languages/jquery.validationEngine-en.js
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/validate.php
Protocol
HTTP/1.1
Server
108.167.183.74 Houston, United States, ASN20013 (CYRUSONE - CyrusOne LLC, US),
Reverse DNS
Software
nginx/1.12.0 /
Resource Hash
7721455fa8bf5157b3ebf293814cf83bd1186a56e0a2db8ce210f21cc8fc27b6

Request headers

Referer
http://paypal2.caughtgbpspp.com/sd/validate.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Sat, 17 Jun 2017 09:22:11 GMT
Content-Encoding
gzip
Last-Modified
Wed, 21 Dec 2016 00:49:02 GMT
Server
nginx/1.12.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
application/javascript
jquery.validationEngine.js
paypal2.caughtgbpspp.com/sd/base/valid8/js/
74 KB
22 KB
Script
General
Full URL
http://paypal2.caughtgbpspp.com/sd/base/valid8/js/jquery.validationEngine.js
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/validate.php
Protocol
HTTP/1.1
Server
108.167.183.74 Houston, United States, ASN20013 (CYRUSONE - CyrusOne LLC, US),
Reverse DNS
Software
nginx/1.12.0 /
Resource Hash
a82974655731d5a3bb3719522e09dfb28be1680da16314ff5d7367f8f92bd92e

Request headers

Referer
http://paypal2.caughtgbpspp.com/sd/validate.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Sat, 17 Jun 2017 09:22:11 GMT
Content-Encoding
gzip
Last-Modified
Tue, 22 Mar 2016 13:36:10 GMT
Server
nginx/1.12.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
application/javascript
PayPalSansSmall-Regular.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/
46 KB
46 KB
Font
General
Full URL
https://www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/PayPalSansSmall-Regular.woff
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/base/valid8/js/jquery-1.8.2.min.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.101.242.48 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-101-242-48.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
ae79dcc3eb016922caa1d095cfd936446bc65a46bb3364b242dfc556f7e3c6a8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36
Referer
http://paypal2.caughtgbpspp.com/sd/base/app2.css
Origin
http://paypal2.caughtgbpspp.com

Response headers

date
Sat, 17 Jun 2017 09:22:12 GMT
x-pad
avoid browser bug
last-modified
Wed, 30 Sep 2015 05:09:04 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
application/x-font-woff
access-control-allow-origin
*
accept-ranges
bytes
content-length
47339
expires
Mon, 17 Jul 2017 09:22:12 GMT
monogram@2x.png
www.paypalobjects.com/images/shared/
2 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/monogram@2x.png
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/base/valid8/js/jquery-1.8.2.min.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.101.242.48 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-101-242-48.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
2a2cacf1f67863eedabdf29f70e2ad64391a1a1cb005f722fea3fe5e3c47230d

Request headers

Referer
http://paypal2.caughtgbpspp.com/sd/base/app2.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

pragma
no-cache
date
Sat, 17 Jun 2017 09:22:12 GMT
last-modified
Tue, 15 Mar 2016 21:42:48 GMT
server
Apache
p3p
CP="NON DSP ADM DEV PSD OUR IND STP PHY PRE NAV UNI"
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-type
image/png
content-length
2020
expires
Sat, 17 Jun 2017 09:22:12 GMT
PayPalSansBig-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/
48 KB
48 KB
Font
General
Full URL
https://www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/PayPalSansBig-Light.woff
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/base/valid8/js/jquery-1.8.2.min.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.101.242.48 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-101-242-48.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
c599c554590d1a336ffcb9627f6caaac34b6228f60e15f5f25454bff38facb7e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36
Referer
http://paypal2.caughtgbpspp.com/sd/base/app2.css
Origin
http://paypal2.caughtgbpspp.com

Response headers

date
Sat, 17 Jun 2017 09:22:12 GMT
x-pad
avoid browser bug
last-modified
Wed, 30 Sep 2015 05:09:04 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
application/x-font-woff
access-control-allow-origin
*
accept-ranges
bytes
content-length
49115
expires
Mon, 17 Jul 2017 09:22:12 GMT
PayPalSansSmall-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/
46 KB
46 KB
Font
General
Full URL
https://www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/PayPalSansSmall-Light.woff
Requested by
Host: paypal2.caughtgbpspp.com
URL: http://paypal2.caughtgbpspp.com/sd/base/valid8/js/jquery-1.8.2.min.js
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
95.101.242.48 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a95-101-242-48.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
843e67ad522a908162007f4b7601819a5bbfef00e38ac7aec778766da8b7b2ab

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36
Referer
http://paypal2.caughtgbpspp.com/sd/base/app2.css
Origin
http://paypal2.caughtgbpspp.com

Response headers

date
Sat, 17 Jun 2017 09:22:12 GMT
x-pad
avoid browser bug
last-modified
Wed, 30 Sep 2015 05:09:04 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
application/x-font-woff
access-control-allow-origin
*
accept-ranges
bytes
content-length
46703
expires
Mon, 17 Jul 2017 09:22:12 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies