pushy-hardhat.glitch.me
Open in
urlscan Pro
52.5.221.248
Malicious Activity!
Public Scan
Submission: On July 09 via automatic, source phishtank
Summary
This is the only time pushy-hardhat.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 52.5.221.248 52.5.221.248 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
9 | 23.210.248.226 23.210.248.226 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
15 | 3 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-52-5-221-248.compute-1.amazonaws.com
pushy-hardhat.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
paypalobjects.com
www.paypalobjects.com |
78 KB |
5 |
glitch.me
pushy-hardhat.glitch.me |
137 KB |
3 |
paypal.com
c.paypal.com dub.stats.paypal.com Failed t.paypal.com |
19 KB |
15 | 3 |
Domain | Requested by | |
---|---|---|
6 | www.paypalobjects.com |
pushy-hardhat.glitch.me
|
5 | pushy-hardhat.glitch.me |
pushy-hardhat.glitch.me
|
2 | c.paypal.com |
pushy-hardhat.glitch.me
c.paypal.com |
1 | t.paypal.com | |
0 | dub.stats.paypal.com Failed | |
15 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 3 frames:
Primary Page:
http://pushy-hardhat.glitch.me/
Frame ID: 88DD31330ABDB3C086B9E3C4C622D317
Requests: 13 HTTP requests in this frame
Frame:
https://dub.stats.paypal.com/counter2.cgi
Frame ID: 1C5628454AD2EAC2C78F57A5E1267205
Requests: 1 HTTP requests in this frame
Frame:
https://c.paypal.com/v1/r/d/i?js_src=https://c.paypal.com/webstatic/r/fb/fb-all-prod.pp2.min.js
Frame ID: 133A903610F11E2691194746278E473F
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 10- https://b.stats.paypal.com/v1/counter.cgi?r=cD1kNjBkYTdjOGQ1NWQ0NWM1YWVmNDI2OTg2ZWIxM2VjOSZpPTQ3LjIxOC4yNTMuODEmdD0xNTYyNTQwOTExLjI5JmE9MjEmcz1VTklGSUVEX0xPR0lObp-1000T_pdOrPZgcoCwlt-MOz8 HTTP 302
- https://dub.stats.paypal.com/counter2.cgi
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
pushy-hardhat.glitch.me/ |
135 KB 135 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contextualLogin.css
www.paypalobjects.com/web/res/342/a5bcd16fc3a1ac136f7de663aff04/css/ |
87 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-PN-check.png
www.paypalobjects.com/images/shared/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyph_alert_critical_big-2x.png
www.paypalobjects.com/images/shared/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
www.paypalobjects.com/pa/js/min/ |
40 KB 15 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
challenge.js
pushy-hardhat.glitch.me/auth/createchallenge/a08b03b669d1d58b/ |
189 B 438 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb-all-prod.pp2.min.js
c.paypal.com/webstatic/r/fb/ |
58 KB 18 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
client-log
pushy-hardhat.glitch.me/signin/ |
157 B 406 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
pushy-hardhat.glitch.me/signin/ |
160 B 409 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tealeaf-ul-prod_domcap.min.js
www.paypalobjects.com/web/res/342/a5bcd16fc3a1ac136f7de663aff04/js/lib/ |
110 KB 35 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
counter2.cgi
dub.stats.paypal.com/ Frame 1C56 Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
i
c.paypal.com/v1/r/d/ Frame 133A |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
pushy-hardhat.glitch.me/signin/ |
160 B 409 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ts
t.paypal.com/ |
42 B 558 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- dub.stats.paypal.com
- URL
- https://dub.stats.paypal.com/counter2.cgi
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)31 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| html5 object| Modernizr function| isEligibleIntegration object| antiClickjack object| PAYPAL function| $ object| fpti string| fptiserverurl object| _ifpti function| AjaxRequest string| PP_SERVICE_URL string| BASE_SWF_URL string| BEACON_BASE_URL string| PP_IFRAME_JS_URL string| PP_NEW_SERVICE_URL string| PP_VERSION object| Configuration object| PFB_4732Config object| PFB_4732 object| dataCollector object| fp undefined| runFb function| initTsFb object| jstz function| SwfStore function| SlvtStore object| pako object| TLT0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
c.paypal.com
dub.stats.paypal.com
pushy-hardhat.glitch.me
t.paypal.com
www.paypalobjects.com
dub.stats.paypal.com
23.210.248.226
52.5.221.248
13e4806e5c517e074ab1ea26fe0f2b7b87eaa3988006f35ed0bd4c89502d0d79
22027bb7a536c4631d05950c052600da4e4e6b697c0ffee2189da38e05857466
4a77d272b8cf508cc4a7e0da5763faa9958e42a5554fdb5d29fc3be51d685653
4b56ec83a4fb18a54601eb4cd3a42c51f1b5ae7a2e7ce51b646ecf07d6a64b6a
5aa5acab723e19cdd3c08e54977ff487d39b0add98ebc646cb31a8ecd322fa9b
5f30d6a4b324d69ffc80ebc7d7ca7b20daf48aea86aa783d4cbdaf86f28e5aba
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
7228b1b90209f405d8c34daf7e54c568c9b8a21674ea4794451c45f3290ecf6b
7357537d7d0c67c2b6074ff794223a4e6fb3dc5ca23ddd2f2390087e8dc6e06f
772526bffa066421b2448d3aa6b0638f76473660c9e2a0eeaeae5779ec1abe50
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
eda0a3b80b9a6c146817151721cb4e4c38bb88bae41419df26f5f67156fa14b3