account-pay2pal.tk
Open in
urlscan Pro
2606:4700:30::6818:6a18
Malicious Activity!
Public Scan
Submission Tags: phishingcatcher certstream Search All
Submission: On August 26 via api from CH
Summary
This is the only time account-pay2pal.tk was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2606:4700:30:... 2606:4700:30::6818:6a18 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
2 10 | 23.210.248.226 23.210.248.226 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
2 | 2a01:4a0:1338... 2a01:4a0:1338:28::c38a:ff0b | 201011 (NETZBETRI...) (NETZBETRIEB-GMBH) | |
11 | 3 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
account-pay2pal.tk |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a23-210-248-226.deploy.static.akamaitechnologies.com
www.paypalobjects.com | |
t.paypal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
paypalobjects.com
2 redirects
www.paypalobjects.com |
144 KB |
2 |
akamaihd.net
ds-aksb-a.akamaihd.net |
5 KB |
1 |
paypal.com
t.paypal.com |
536 B |
1 |
account-pay2pal.tk
account-pay2pal.tk |
5 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
9 | www.paypalobjects.com |
2 redirects
account-pay2pal.tk
|
2 | ds-aksb-a.akamaihd.net |
account-pay2pal.tk
|
1 | t.paypal.com | |
1 | account-pay2pal.tk | |
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2019-08-18 - 2020-08-18 |
a year | crt.sh |
1970-01-01 - 1970-01-01 |
a few seconds | crt.sh |
This page contains 1 frames:
Primary Page:
http://account-pay2pal.tk/
Frame ID: 6D828922B99F650BDBC63741B0192E72
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
PayPal (Payment Processors) ExpandDetected patterns
- script /paypalobjects\.com\/js/i
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- script /require.*\.js/i
CloudFlare (CDN) Expand
Detected patterns
- headers server /^cloudflare$/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://www.paypalobjects.com/js/site_catalyst/pp_jscode_080706.js HTTP 301
- https://www.paypalobjects.com/js/site_catalyst/pp_jscode_080706.js
- http://www.paypalobjects.com/pa/js/pa.js HTTP 301
- https://www.paypalobjects.com/pa/js/pa.js
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
account-pay2pal.tk/ |
12 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
www.paypalobjects.com/web/res/f1d/cfa3641291d4791aa39a43f36f6e2/css/ |
42 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-2.6.1.js
www.paypalobjects.com/web/res/f1d/cfa3641291d4791aa39a43f36f6e2/js/lib/ |
4 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
require.js
www.paypalobjects.com/web/res/f1d/cfa3641291d4791aa39a43f36f6e2/js/lib/ |
15 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
www.paypalobjects.com/web/res/f1d/cfa3641291d4791aa39a43f36f6e2/js/ |
276 KB 84 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pp_jscode_080706.js
www.paypalobjects.com/js/site_catalyst/ Redirect Chain
|
60 KB 23 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
www.paypalobjects.com/pa/js/ Redirect Chain
|
41 KB 15 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aksb.min.js
ds-aksb-a.akamaihd.net/ |
13 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b
ds-aksb-a.akamaihd.net/2/113982/ |
0 269 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ts
t.paypal.com/ |
42 B 536 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)43 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| html5 object| Modernizr object| antiClickjack object| w object| d object| AKSB function| require function| requirejs function| define function| extend function| $ function| jQuery object| dust function| _ object| Backbone object| jQuery180012091620469863429 string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code string| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| scOnload object| PAYPAL object| fpti string| fptiserverurl object| _ifpti string| j object| s_i_paypal object| RT3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.account-pay2pal.tk/ | Name: s_sess Value: %20s_ppv%3D100%3B%20s_cc%3Dtrue%3B%20v31%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%3B%20s_sq%3D%3B |
|
.account-pay2pal.tk/ | Name: s_pers Value: %20s_fid%3D1C30D4956AC20393-30E1247882D99296%7C1629999695143%3B%20gpv_c43%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1566843095145%3B%20tr_p1%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1566843095147%3B%20gpv_events%3Dno%2520value%7C1566843095148%3B |
|
.account-pay2pal.tk/ | Name: __cfduid Value: ddca9ee1dd1e1faec5c6bc10b1014bbe31566841293 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
account-pay2pal.tk
ds-aksb-a.akamaihd.net
t.paypal.com
www.paypalobjects.com
23.210.248.226
2606:4700:30::6818:6a18
2a01:4a0:1338:28::c38a:ff0b
18a569f10c35c4a4739a0cc5972f998cb588b6725c8641ac54a64682be0e57cd
18c9428f5ed837e027c6fcf29afe9d1f63a1e1e5b53ee1dc6373cf1cd1ea22aa
51b1b037acaa44b9924e53fc3db9eab33485fed30fdd8d208786b5d83f9c77bf
57b03bb5c995ddd9d44893ade4c047998e3adc628c3cecaae2ef181532c6cde0
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
7f06def529e0076b37f65c60085a6b1c65f1bbab0b1f87c72c188018b5094966
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
eb5d0331c96921b5946910361997a4bc92ecda422b5f1bea8e10fabe13481a9f