paypalverif0xzzx0.ddns.net Open in urlscan Pro
13.76.186.145  Malicious Activity! Public Scan

URL: https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Submission: On October 23 via api from QA

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 13.76.186.145, located in Singapore, Singapore and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is paypalverif0xzzx0.ddns.net.
TLS certificate: Issued by Let's Encrypt Authority X3 on October 21st 2020. Valid for: 3 months.
This is the only time paypalverif0xzzx0.ddns.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
2 13.76.186.145 8075 (MICROSOFT...)
1 151.101.114.133 54113 (FASTLY)
4 3
Apex Domain
Subdomains
Transfer
2 ddns.net
paypalverif0xzzx0.ddns.net
26 KB
1 paypalobjects.com
www.paypalobjects.com
2 KB
0 jquery.com Failed
code.jquery.com Failed
4 3
Domain Requested by
2 paypalverif0xzzx0.ddns.net paypalverif0xzzx0.ddns.net
1 www.paypalobjects.com paypalverif0xzzx0.ddns.net
0 code.jquery.com Failed paypalverif0xzzx0.ddns.net
4 3

This site contains no links.

Subject Issuer Validity Valid
paypalverif0xzzx0.ddns.net
Let's Encrypt Authority X3
2020-10-21 -
2021-01-19
3 months crt.sh
www.paypalobjects.com
DigiCert SHA2 Extended Validation Server CA
2019-12-09 -
2021-12-13
2 years crt.sh

This page contains 1 frames:

Primary Page: https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Frame ID: 9D3DF48EFE3ED2756B7DCCD76D6C9DF3
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

75 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

28 kB
Transfer

32 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/
3 KB
1 KB
Document
General
Full URL
https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.76.186.145 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
95dedf6721219e0690612d1396a8091f2157f28407294628ee09ea5a03aab031

Request headers

Host
paypalverif0xzzx0.ddns.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:42:45 GMT
Server
Apache
Content-Encoding
gzip
Vary
Accept-Encoding
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.css
paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/
24 KB
25 KB
Stylesheet
General
Full URL
https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/style.css
Requested by
Host: paypalverif0xzzx0.ddns.net
URL: https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.76.186.145 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
562e585efab210b7cbdb49a5f72814f7d561486e7368159e1ef38531d38afc88

Request headers

Referer
https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:42:45 GMT
Last-Modified
Thu, 22 Oct 2020 14:02:22 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
25054
jquery-2.1.4.min.js
code.jquery.com/
0
0

paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: paypalverif0xzzx0.ddns.net
URL: https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/style.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Referer
https://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 23 Oct 2020 01:42:46 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
18684546
x-cache
HIT, HIT, HIT
status
200
surrorage-key
/images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared /images
vary
Accept-Encoding
content-length
1929
via
1.1 varnish, 1.1 varnish, 1.1 varnish
x-served-by
cache-sjc10024-SJC, cache-dfw18665-DFW, cache-hhn4068-HHN
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
x-timer
S1603417366.292269,VS0,VE0
strict-transport-security
max-age=31557600
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
1, 287968, 30684

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
code.jquery.com
URL
http://code.jquery.com/jquery-2.1.4.min.js

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes

0 Cookies