paypalverifycentral.com Open in urlscan Pro
137.117.67.34  Malicious Activity! Public Scan

URL: https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&em...
Submission Tags: @jcybersec_
Submission: On May 26 via api from GB

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 137.117.67.34, located in Washington, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is paypalverifycentral.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on May 9th 2020. Valid for: 3 months.
This is the only time paypalverifycentral.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
4 137.117.67.34 8075 (MICROSOFT...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
5 2
Apex Domain
Subdomains
Transfer
4 paypalverifycentral.com
paypalverifycentral.com
35 KB
1 jquery.com
code.jquery.com
33 KB
5 2
Domain Requested by
4 paypalverifycentral.com paypalverifycentral.com
code.jquery.com
1 code.jquery.com paypalverifycentral.com
5 2

This site contains no links.

Subject Issuer Validity Valid
paypalverifycentral.com
Let's Encrypt Authority X3
2020-05-09 -
2020-08-07
3 months crt.sh
jquery.org
COMODO RSA Domain Validation Secure Server CA
2018-10-17 -
2020-10-16
2 years crt.sh

This page contains 1 frames:

Primary Page: https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
Frame ID: 2903AB92CE518F9099170A72F16B8899
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

68 kB
Transfer

128 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/
1 KB
1 KB
Document
General
Full URL
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
137.117.67.34 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx / PHP/7.3.17 PleskLin
Resource Hash
683fcbd2ec7089d20fe9df538e6a5bcacbe544ee60a4472eb9dc843f261149f6

Request headers

:method
GET
:authority
paypalverifycentral.com
:scheme
https
:path
/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
server
nginx
date
Tue, 26 May 2020 23:45:56 GMT
content-type
text/html; charset=UTF-8
content-length
1032
x-powered-by
PHP/7.3.17 PleskLin
set-cookie
PHPSESSID=kc9mc3novjlh3j2s8qjioj0q80; path=/
main.css
paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/
2 KB
2 KB
Stylesheet
General
Full URL
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/main.css
Requested by
Host: paypalverifycentral.com
URL: https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
137.117.67.34 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx / PleskLin
Resource Hash
1d9ca1fb34f6343ef6a7fe8ab6ba2f531749bcd79c3bc63de5ae0bd8667b93ed

Request headers

Referer
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 26 May 2020 23:45:56 GMT
last-modified
Sun, 10 May 2020 04:25:31 GMT
server
nginx
x-powered-by
PleskLin
etag
"5eb7823b-79e"
content-type
text/css
status
200
accept-ranges
bytes
content-length
1950
jquery.min.js
code.jquery.com/
94 KB
33 KB
Script
General
Full URL
https://code.jquery.com/jquery.min.js
Requested by
Host: paypalverifycentral.com
URL: https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2001:4de0:ac19::1:b:1a , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
4b940065e2a67c37e3bd02b23c651f4744a3c219aba2d4fb99a631113494d376

Request headers

Referer
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Tue, 26 May 2020 23:45:56 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:08 GMT
Server
nginx
ETag
W/"54499a48-1764d"
Vary
Accept-Encoding
X-HW
1590536756.dop031.fr8.t,1590536756.cds052.fr8.shn,1590536756.cds052.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
33226
js1.js
paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/
453 B
631 B
Script
General
Full URL
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/js1.js
Requested by
Host: paypalverifycentral.com
URL: https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
137.117.67.34 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx / PleskLin
Resource Hash
10cebd0c0f6acd425dd9f2002fa182e536553bd88c27b24bef5349610034ba04

Request headers

Referer
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/?dispatch=T1Sgo4lzV74lbaNRGdoAstC0UOKtHLcZE74MYrGiGYjNGVoSij&email=
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 26 May 2020 23:45:56 GMT
etag
"1c5-5a5439eead90c"
last-modified
Sun, 10 May 2020 04:25:31 GMT
server
nginx
x-powered-by
PleskLin
content-type
application/javascript
status
200
x-accel-version
0.01
accept-ranges
bytes
content-length
453
Mahdi_1.png
paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/
31 KB
31 KB
Image
General
Full URL
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/Mahdi_1.png
Requested by
Host: code.jquery.com
URL: https://code.jquery.com/jquery.min.js
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
137.117.67.34 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
nginx / PleskLin
Resource Hash
f94fa1fde7ad44a42ed416919da3c001c4d1f450543071f56105d6c7bef5afdb

Request headers

Referer
https://paypalverifycentral.com/8b6a8854e849462da5e6ede86149a73a/M/main.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Tue, 26 May 2020 23:45:56 GMT
last-modified
Sun, 10 May 2020 04:25:31 GMT
server
nginx
x-powered-by
PleskLin
etag
"5eb7823b-7cd4"
content-type
image/png
status
200
accept-ranges
bytes
content-length
31956

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| validate

1 Cookies

Domain/Path Name / Value
paypalverifycentral.com/ Name: PHPSESSID
Value: kc9mc3novjlh3j2s8qjioj0q80