www.narahookah.com Open in urlscan Pro
67.20.76.238  Malicious Activity! Public Scan

Submitted URL: https://u12308589.ct.sendgrid.net/ls/click?upn=DPy9QSHkhc8JaLYi2rhVND9ZsMTo6DvyHLJ2DKh18-2FaNliWvv-2Bh-2FU4jwztO9DZxmMG1gVcv59I6w6...
Effective URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Submission: On August 24 via manual from AU

Summary

This website contacted 3 IPs in 2 countries across 4 domains to perform 8 HTTP transactions. The main IP is 67.20.76.238, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is www.narahookah.com.
This is the only time www.narahookah.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.115.54 11377 (SENDGRID)
1 34.200.111.218 14618 (AMAZON-AES)
6 67.20.76.238 46606 (UNIFIEDLA...)
1 104.111.228.123 16625 (AKAMAI-AS)
8 3
Domain Requested by
6 www.narahookah.com www.narahookah.com
1 www.paypalobjects.com www.narahookah.com
1 webhawksit.com.bd
1 u12308589.ct.sendgrid.net 1 redirects
8 4

This site contains no links.

Subject Issuer Validity Valid
webhawksit.com
Sectigo RSA Domain Validation Secure Server CA
2020-01-07 -
2021-01-01
a year crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2020-01-09 -
2022-01-12
2 years crt.sh

This page contains 1 frames:

Primary Page: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Frame ID: E5250634183358D74AC7FBFF9904B441
Requests: 8 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://u12308589.ct.sendgrid.net/ls/click?upn=DPy9QSHkhc8JaLYi2rhVND9ZsMTo6DvyHLJ2DKh18-2FaNliWvv-2Bh-2FU4jwz... HTTP 302
    https://webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/bd.html Page URL
  2. http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

8
Requests

25 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

3
IPs

2
Countries

132 kB
Transfer

293 kB
Size

2
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://u12308589.ct.sendgrid.net/ls/click?upn=DPy9QSHkhc8JaLYi2rhVND9ZsMTo6DvyHLJ2DKh18-2FaNliWvv-2Bh-2FU4jwztO9DZxmMG1gVcv59I6w6uLbiik2dWvbx2ZUsXxfS60Q8-2FRTBhU-3DAS0y_Om9RztAdvFAUohMYoBnHReHF0b5D13RxmNU6jEgMS2YMiFmHxwVclGor6T7D0BMOeHphDOpbPr5T-2FqPeFCI4luKt5Qfs-2F4c0cHri6PdtWhfqnLCRlxu5Ok1uyXZ4lxxXbaz78OomU3deoFabT9tG7ydUHDS3j4FWRgd0IChpXnEgz4Nz-2FOWcrOr5nVQ7-2BT-2FXAaj9wzOX8hwyBRlPpttnplO43B42RfZyh4FqFr9VAaA-3D HTTP 302
    https://webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/bd.html Page URL
  2. http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://u12308589.ct.sendgrid.net/ls/click?upn=DPy9QSHkhc8JaLYi2rhVND9ZsMTo6DvyHLJ2DKh18-2FaNliWvv-2Bh-2FU4jwztO9DZxmMG1gVcv59I6w6uLbiik2dWvbx2ZUsXxfS60Q8-2FRTBhU-3DAS0y_Om9RztAdvFAUohMYoBnHReHF0b5D13RxmNU6jEgMS2YMiFmHxwVclGor6T7D0BMOeHphDOpbPr5T-2FqPeFCI4luKt5Qfs-2F4c0cHri6PdtWhfqnLCRlxu5Ok1uyXZ4lxxXbaz78OomU3deoFabT9tG7ydUHDS3j4FWRgd0IChpXnEgz4Nz-2FOWcrOr5nVQ7-2BT-2FXAaj9wzOX8hwyBRlPpttnplO43B42RfZyh4FqFr9VAaA-3D HTTP 302
  • https://webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/bd.html

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
bd.html
webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/
Redirect Chain
  • https://u12308589.ct.sendgrid.net/ls/click?upn=DPy9QSHkhc8JaLYi2rhVND9ZsMTo6DvyHLJ2DKh18-2FaNliWvv-2Bh-2FU4jwztO9DZxmMG1gVcv59I6w6uLbiik2dWvbx2ZUsXxfS60Q8-2FRTBhU-3DAS0y_Om9RztAdvFAUohMYoBnHReHF0b5...
  • https://webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/bd.html
155 B
397 B
Document
General
Full URL
https://webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/bd.html
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.200.111.218 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-200-111-218.compute-1.amazonaws.com
Software
Apache /
Resource Hash
2a2ade7988281a0ffc4bb5857e9e23dbda861698ec3139b4e4bd598f6361f0c0

Request headers

Host
webhawksit.com.bd
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:18 GMT
Server
Apache
Last-Modified
Sat, 22 Aug 2020 21:02:37 GMT
Accept-Ranges
bytes
Content-Length
155
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html

Redirect headers

Server
nginx
Date
Mon, 24 Aug 2020 23:41:18 GMT
Content-Type
text/html; charset=utf-8
Content-Length
92
Connection
keep-alive
Location
https://webhawksit.com.bd/vendor/phpunit/phpunit/src/Util/PHP/bd.html
X-Robots-Tag
noindex, nofollow
Primary Request Cookie set /
www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
9 KB
4 KB
Document
General
Full URL
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Protocol
HTTP/1.1
Server
67.20.76.238 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
host2044.hostmonster.com
Software
Apache /
Resource Hash
db7a7963ab0171a53ff9d8a31c78d84d48eba7ca36bb4b70c73e319ce7548421

Request headers

Host
www.narahookah.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:19 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=b6d69563bace2d5ade29d775dac81b64; path=/
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
4002
Keep-Alive
timeout=5, max=75
Content-Type
text/html; charset=UTF-8
xcontexLogx.css
www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/
95 KB
24 KB
Stylesheet
General
Full URL
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xcontexLogx.css
Requested by
Host: www.narahookah.com
URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Protocol
HTTP/1.1
Server
67.20.76.238 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
host2044.hostmonster.com
Software
Apache /
Resource Hash
40cf44cfccddac0b1a40febe66f0eae3d6fbcea96b451e35d39a6a04603df683

Request headers

Referer
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:20 GMT
Content-Encoding
gzip
Last-Modified
Sun, 16 Aug 2020 12:08:18 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=74
jquery.min.js
www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/
85 KB
38 KB
Script
General
Full URL
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/jquery.min.js
Requested by
Host: www.narahookah.com
URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Protocol
HTTP/1.1
Server
67.20.76.238 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
host2044.hostmonster.com
Software
Apache /
Resource Hash
d30b6114fb9496ae46b2a8cdf59379c8ffdb957534bd1dd73e626c7c61c7e67d

Request headers

Referer
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:20 GMT
Content-Encoding
gzip
Last-Modified
Sun, 16 Aug 2020 12:08:18 GMT
Server
Apache
Vary
Accept-Encoding
Upgrade
h2,h2c
Transfer-Encoding
chunked
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5, max=75
xsinsecx.js
www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/
7 KB
2 KB
Script
General
Full URL
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xsinsecx.js
Requested by
Host: www.narahookah.com
URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Protocol
HTTP/1.1
Server
67.20.76.238 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
host2044.hostmonster.com
Software
Apache /
Resource Hash
12c7df384dbccde3b93b86aa2421767e3a43543d81068878ad96e9ffd3f27e87

Request headers

Referer
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:20 GMT
Content-Encoding
gzip
Last-Modified
Sun, 16 Aug 2020 12:08:18 GMT
Server
Apache
Vary
Accept-Encoding
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5, max=75
Content-Length
1890
xppappx.js
www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/
62 KB
28 KB
Script
General
Full URL
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xppappx.js
Requested by
Host: www.narahookah.com
URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
Protocol
HTTP/1.1
Server
67.20.76.238 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
host2044.hostmonster.com
Software
Apache /
Resource Hash
36b360980867ad906788319227a2985598db4d889d8c3cc5c53fc1ad03f78d49

Request headers

Referer
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Sign-in/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:20 GMT
Content-Encoding
gzip
Last-Modified
Sun, 16 Aug 2020 12:08:18 GMT
Server
Apache
Vary
Accept-Encoding
Upgrade
h2,h2c
Transfer-Encoding
chunked
Connection
Upgrade, Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5, max=75
loginlogo.svg
www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/
5 KB
5 KB
Image
General
Full URL
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/loginlogo.svg
Requested by
Host: www.narahookah.com
URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xcontexLogx.css
Protocol
HTTP/1.1
Server
67.20.76.238 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
host2044.hostmonster.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xcontexLogx.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 24 Aug 2020 23:41:20 GMT
Last-Modified
Sun, 16 Aug 2020 12:08:18 GMT
Server
Apache
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=73
Content-Length
4945
sprite_forms_2x.png
www.paypalobjects.com/images/shared/
30 KB
31 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/sprite_forms_2x.png
Requested by
Host: www.narahookah.com
URL: http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xcontexLogx.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.228.123 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-228-123.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
3fae4e32aefbd1524f01b66f06ba194d8633ec10c6ae086784a64e14cc44feb1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://www.narahookah.com/public/user/PayPal/customer_center/customer_Case=IDPP00C311/myaccount/Safe/XASSEST/xcontexLogx.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Mon, 24 Aug 2020 23:41:20 GMT
x-content-type-options
nosniff
last-modified
Thu, 19 Jul 2018 20:49:36 GMT
server
Apache
strict-transport-security
max-age=31536000
content-type
image/png
status
200
cache-control
max-age=3600
accept-ranges
bytes
content-length
31122
expires
Tue, 25 Aug 2020 00:41:20 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

24 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| n9afb4d string| k function| $ function| jQuery string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code undefined| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq

2 Cookies

Domain/Path Name / Value
.narahookah.com/ Name: s_sess
Value: %20s_ppv%3D100%3B
www.narahookah.com/ Name: PHPSESSID
Value: b6d69563bace2d5ade29d775dac81b64