www.lookchingiant.com
Open in
urlscan Pro
61.19.246.241
Malicious Activity!
Public Scan
Effective URL: http://www.lookchingiant.com/uploads/files/jp/xppl/
Submission: On December 21 via manual from US
Summary
This is the only time www.lookchingiant.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 94.126.169.163 94.126.169.163 | 33876 (FLESK-AS) (FLESK-AS) | |
1 8 | 61.19.246.241 61.19.246.241 | 9335 (CAT-CLOUD...) (CAT-CLOUD-AP CAT Telecom Public Company Limited) | |
8 | 2 |
ASN9335 (CAT-CLOUD-AP CAT Telecom Public Company Limited, TH)
PTR: Ns2.nccomputer.biz
www.lookchingiant.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
lookchingiant.com
1 redirects
www.lookchingiant.com |
35 KB |
1 |
hamidshini.com
www.hamidshini.com |
195 B |
8 | 2 |
Domain | Requested by | |
---|---|---|
8 | www.lookchingiant.com |
1 redirects
www.lookchingiant.com
|
1 | www.hamidshini.com | |
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.hamidshini.com Let's Encrypt Authority X3 |
2019-12-21 - 2020-03-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.lookchingiant.com/uploads/files/jp/xppl/
Frame ID: 9E5641925CF8AAA0A5695DC70E78DEBD
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://www.hamidshini.com/japan2.html Page URL
- http://www.lookchingiant.com/uploads/files/jp/xppl/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.hamidshini.com/japan2.html Page URL
- http://www.lookchingiant.com/uploads/files/jp/xppl/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- http://www.lookchingiant.com/uploads/files/jp/xppl/856325835 HTTP 302
- http://www.lookchingiant.com/uploads/files/jp/xppl/index.php
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
japan2.html
www.hamidshini.com/ |
98 B 195 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
Cookie set
/
www.lookchingiant.com/uploads/files/jp/xppl/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xppl-Login.css
www.lookchingiant.com/uploads/files/jp/xppl/x-css/ |
53 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
erur.js
www.lookchingiant.com/uploads/files/jp/xppl/x-js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
min.js
www.lookchingiant.com/uploads/files/jp/xppl/x-js/ |
44 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xppl-logo.svg
www.lookchingiant.com/uploads/files/jp/xppl/x-images/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
www.lookchingiant.com/uploads/files/jp/xppl/ Redirect Chain
|
6 KB 3 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
www.lookchingiant.com/uploads/files/jp/xppl/ |
6 KB 3 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| xpp object| PAYPAL function| $1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.lookchingiant.com/ | Name: PHPSESSID Value: a50621d2ce6333637c11fb4a5d74575f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.hamidshini.com
www.lookchingiant.com
61.19.246.241
94.126.169.163
13d5d870093f20d85b77638fdaac96c173bd9ab4fa3d17e95ff3f0edd9cd5386
b3e42c18bed28b498e74da5cdcc33a8e677e3131fe95ef065ce548a025698f9b
d0e20823e275cd9ab8cc10740fec894b45f4d8e41333190ad6777187ed6d575b
d6d31e01837a0961922895825ba408604a2044ce48fb269c95bd714035ce42a6
da7690bd993ff6433b42dc44725e384edefbff67a5f0b8c320e6ddb162cdd12a
e7732075c1658de8aa753e0eee55aaaa03d3bd2d4cb59cf77ee5ecbf52977ae2
e931105f32bd8f02c787b2612a15ec7aef4a138e6271c1dbd060e39a63a7b29a