ip-160-153-246-94.ip.secureserver.net Open in urlscan Pro
160.153.246.94  Malicious Activity! Public Scan

Submitted URL: http://ip-160-153-246-94.ip.secureserver.net/PAYonline/
Effective URL: http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
Submission: On October 23 via automatic, source openphish

Summary

This website contacted 4 IPs in 1 countries across 3 domains to perform 6 HTTP transactions. The main IP is 160.153.246.94, located in Scottsdale, United States and belongs to GODADDY-AMS, DE. The main domain is ip-160-153-246-94.ip.secureserver.net.
This is the only time ip-160-153-246-94.ip.secureserver.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
4 160.153.246.94 21501 (GODADDY-AMS)
1 2606:4700:20:... 13335 (CLOUDFLAR...)
1 67.202.94.93 32748 (STEADFAST)
6 4
Apex Domain
Subdomains
Transfer
4 secureserver.net
ip-160-153-246-94.ip.secureserver.net
79 KB
1 amung.us
whos.amung.us
213 B
1 waust.at
waust.at
4 KB
6 3
Domain Requested by
4 ip-160-153-246-94.ip.secureserver.net ip-160-153-246-94.ip.secureserver.net
1 whos.amung.us waust.at
1 waust.at ip-160-153-246-94.ip.secureserver.net
6 3

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
Frame ID: F878CE78FC9E908D3DA636644A0648F9
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://ip-160-153-246-94.ip.secureserver.net/PAYonline/ Page URL
  2. http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /php\/?([\d.]+)?/i

Overall confidence: 100%
Detected patterns
  • headers server /CentOS/i

Overall confidence: 100%
Detected patterns
  • headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

6
Requests

0 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

4
IPs

1
Countries

84 kB
Transfer

86 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://ip-160-153-246-94.ip.secureserver.net/PAYonline/ Page URL
  2. http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set /
ip-160-153-246-94.ip.secureserver.net/PAYonline/
118 B
590 B
Document
General
Full URL
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/
Protocol
HTTP/1.1
Server
160.153.246.94 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-246-94.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 / PHP/5.4.16
Resource Hash
5bd6c31852dc57028467f674fbc7394c29d79b3abc8ffede90db3281c106ecda

Request headers

Host
ip-160-153-246-94.ip.secureserver.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:35:51 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
X-Powered-By
PHP/5.4.16
Set-Cookie
PHPSESSID=ato5nlb4os50sdve4i0fruer80; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Length
118
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Primary Request signn.php
ip-160-153-246-94.ip.secureserver.net/PAYonline/
7 KB
8 KB
Document
General
Full URL
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
Protocol
HTTP/1.1
Server
160.153.246.94 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-246-94.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 / PHP/5.4.16
Resource Hash
60ba91beac7628c9260e9e35ddbbb0fd66566ecf17038c43bebb4f7583ff6d4a

Request headers

Host
ip-160-153-246-94.ip.secureserver.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=ato5nlb4os50sdve4i0fruer80
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/

Response headers

Date
Fri, 23 Oct 2020 01:35:51 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
X-Powered-By
PHP/5.4.16
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Length
7432
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
contextualLogin.css
ip-160-153-246-94.ip.secureserver.net/PAYonline/main/face/
66 KB
66 KB
Stylesheet
General
Full URL
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/main/face/contextualLogin.css
Requested by
Host: ip-160-153-246-94.ip.secureserver.net
URL: http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
Protocol
HTTP/1.1
Server
160.153.246.94 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-246-94.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 /
Resource Hash
472023cccf3536e266f3ba522807720a821d2c3b4565446321b9809fdcdcf69e

Request headers

Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:35:51 GMT
Last-Modified
Mon, 18 Dec 2017 22:24:04 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
ETag
"1060e-560a4cecd0900"
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
67086
paypal-logo-129x32.svg
ip-160-153-246-94.ip.secureserver.net/PAYonline/main/face/depend/
5 KB
5 KB
Image
General
Full URL
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/main/face/depend/paypal-logo-129x32.svg
Requested by
Host: ip-160-153-246-94.ip.secureserver.net
URL: http://ip-160-153-246-94.ip.secureserver.net/PAYonline/main/face/contextualLogin.css
Protocol
HTTP/1.1
Server
160.153.246.94 Scottsdale, United States, ASN21501 (GODADDY-AMS, DE),
Reverse DNS
ip-160-153-246-94.ip.secureserver.net
Software
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16 /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/main/face/contextualLogin.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:35:51 GMT
Last-Modified
Mon, 18 Dec 2017 22:20:40 GMT
Server
Apache/2.4.6 (CentOS) OpenSSL/1.0.1e-fips mod_fcgid/2.3.9 PHP/5.4.16
ETag
"1351-560a4c2a43e00"
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4945
s.js
waust.at/
8 KB
4 KB
Script
General
Full URL
http://waust.at/s.js
Requested by
Host: ip-160-153-246-94.ip.secureserver.net
URL: http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
Protocol
HTTP/1.1
Server
2606:4700:20::681a:507 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
0298a25db873588e37945ece2b90e9f573dda86bfc84ae9f3efb8c3fbdcbce84

Request headers

Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:35:51 GMT
content-encoding
gzip
CF-Cache-Status
HIT
NEL
{"report_to":"cf-nel","max_age":604800}
Age
681
Transfer-Encoding
chunked
Connection
keep-alive
cf-request-id
05f4b2229d000005f95825a000000001
last-modified
Mon, 05 Oct 2020 15:46:56 GMT
Server
cloudflare
etag
W/"5f7b3ff0-1ed7"
Vary
Accept-Encoding
Report-To
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?lkg-colo=71&lkg-time=1603416951"}],"group":"cf-nel","max_age":604800}
Content-Type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=86400
CF-RAY
5e67b94a9aff05f9-FRA
expires
Sat, 24 Oct 2020 01:24:30 GMT
/
whos.amung.us/pingjs/
29 B
213 B
Script
General
Full URL
http://whos.amung.us/pingjs/?k=i3jbkggqlz&t=Log%20in%20to%20your%20account&c=s&x=http%3A%2F%2Fip-160-153-246-94.ip.secureserver.net%2FPAYonline%2Fsignn.php%3Fx.country%3Den_GB%26pp_authID%3DJRntDTfqMlSzImBsSjmsiIteNmXbPH&y=http%3A%2F%2Fip-160-153-246-94.ip.secureserver.net%2FPAYonline%2F&a=0&d=0.316&v=27&r=5489
Requested by
Host: waust.at
URL: http://waust.at/s.js
Protocol
HTTP/1.1
Server
67.202.94.93 Chicago, United States, ASN32748 (STEADFAST, US),
Reverse DNS
amung.us
Software
/
Resource Hash
ebe52eaf24f7c2756ba8548a3c2f34073e5905542b997f840f8fc9a34fb42c81

Request headers

Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 23 Oct 2020 01:35:51 GMT
content-encoding
gzip
transfer-encoding
chunked
content-type
text/javascript;charset=UTF-8
truncated
/
439 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f6d82f567d08ec91a1b6ef0d4abf21be7a2d3dbc0a41c122584ea3536755b3ac

Request headers

Referer
http://ip-160-153-246-94.ip.secureserver.net/PAYonline/signn.php?x.country=en_GB&pp_authID=JRntDTfqMlSzImBsSjmsiIteNmXbPH
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/gif

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

21 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| showBox function| hideBox function| qYXiHfbltNIU function| isgoode object| _wau object| WAU_ren function| WAU_small function| WAU_small_request function| WAU_r_s function| WAU_insert function| WAU_legacy_b function| WAU_la function| WAU_addCommas function| WAU_lrd function| WAU_lrs function| WAU_cps function| docReady object| x string| x1 string| x2

1 Cookies

Domain/Path Name / Value
ip-160-153-246-94.ip.secureserver.net/ Name: PHPSESSID
Value: ato5nlb4os50sdve4i0fruer80