paypal.server42342.com Open in urlscan Pro
108.167.172.120  Malicious Activity! Public Scan

Submitted URL: https://sfsdv.at.ua/ref.htm
Effective URL: http://paypal.server42342.com/
Submission Tags: phishing malicious Search All
Submission: On August 11 via api from US

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 10 HTTP transactions. The main IP is 108.167.172.120, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is paypal.server42342.com.
This is the only time paypal.server42342.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 213.174.157.150 39572 (ADVANCEDH...)
9 108.167.172.120 46606 (UNIFIEDLA...)
10 2
Apex Domain
Subdomains
Transfer
9 server42342.com
paypal.server42342.com
45 KB
1 at.ua
sfsdv.at.ua
431 B
10 2
Domain Requested by
9 paypal.server42342.com paypal.server42342.com
1 sfsdv.at.ua
10 2

This site contains no links.

Subject Issuer Validity Valid
*.at.ua
RapidSSL RSA CA 2018
2019-07-07 -
2020-07-06
a year crt.sh

1970-01-01 -
1970-01-01
a few seconds crt.sh

This page contains 1 frames:

Primary Page: http://paypal.server42342.com/
Frame ID: BE2CC55C2D2B8275794D930C60E2F3F9
Requests: 10 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://sfsdv.at.ua/ref.htm Page URL
  2. http://paypal.server42342.com/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

10
Requests

10 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

46 kB
Transfer

90 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://sfsdv.at.ua/ref.htm Page URL
  2. http://paypal.server42342.com/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
ref.htm
sfsdv.at.ua/
154 B
431 B
Document
General
Full URL
https://sfsdv.at.ua/ref.htm
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
213.174.157.150 Ashburn, United States, ASN39572 (ADVANCEDHOSTERS-AS, NL),
Reverse DNS
s101.ucoz.net
Software
nginx/1.8.0 /
Resource Hash

Request headers

Host
sfsdv.at.ua
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Server
nginx/1.8.0
Date
Sun, 11 Aug 2019 19:14:47 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Keep-Alive
timeout=15
Expires
Sat, 31 Aug 2019 19:14:47 GMT
Cache-Control
max-age=1728000
Content-Encoding
gzip
Primary Request /
paypal.server42342.com/
10 KB
4 KB
Document
General
Full URL
http://paypal.server42342.com/
Protocol
HTTP/1.1
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
421a1c4dd42f4e45e13b085a371e27f6d006e2bc173cfcec785c35dbe9f44dbb

Request headers

Host
paypal.server42342.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:51 GMT
Server
Apache
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
3559
Keep-Alive
timeout=5, max=75
Content-Type
text/html; charset=UTF-8
global.css
paypal.server42342.com/css/
55 KB
15 KB
Stylesheet
General
Full URL
http://paypal.server42342.com/css/global.css
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
b84a332e4ba422d87e39fe5321945216e6670a8cb4e7674f753b6f11a0607246

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:51 GMT
Content-Encoding
gzip
Last-Modified
Wed, 07 Aug 2019 21:14:11 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=74
Content-Length
15439
logo.gif
paypal.server42342.com/img/
2 KB
3 KB
Image
General
Full URL
http://paypal.server42342.com/img/logo.gif
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
5c048fbf9c37503ddfbc3131ff91818d3f26cb2f1e308d576aae6b5ddb8bffb4

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:51 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/gif
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=73
Content-Length
2354
logintoyouraccount.png
paypal.server42342.com/img/
1 KB
2 KB
Image
General
Full URL
http://paypal.server42342.com/img/logintoyouraccount.png
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
72cfb20cda4173081b02b254efc99676dc351c79067605951e34cce4def44846

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:52 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=71
Content-Length
1363
emailadr.png
paypal.server42342.com/img/
670 B
911 B
Image
General
Full URL
http://paypal.server42342.com/img/emailadr.png
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
febfe7af8bf4d9fd57d7584a98c87eaf9e5528b348434514ff0f2c765c1e668d

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:52 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=70
Content-Length
670
passlogin.png
paypal.server42342.com/img/
620 B
861 B
Image
General
Full URL
http://paypal.server42342.com/img/passlogin.png
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
7e61e782ea7775e7ac7f5e92303019e6f27922f10b2249dd2302239d2704dab1

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:52 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=69
Content-Length
620
forgetlogin.png
paypal.server42342.com/img/
2 KB
3 KB
Image
General
Full URL
http://paypal.server42342.com/img/forgetlogin.png
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
3d2ef60649b12f07765862d2ed86ca019f12fafffdbecdf7809c0f43aa1bed56

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:52 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=68
Content-Length
2359
aio.png
paypal.server42342.com/img/
9 KB
9 KB
Image
General
Full URL
http://paypal.server42342.com/img/aio.png
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
a0b0ea54036ff757e05524a9db70ce3e689ef44552b74f6bf3be89b29eda7fde

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:52 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=67
Content-Length
9477
login-footer.png
paypal.server42342.com/img/
8 KB
9 KB
Image
General
Full URL
http://paypal.server42342.com/img/login-footer.png
Requested by
Host: paypal.server42342.com
URL: http://paypal.server42342.com/
Protocol
HTTP/1.1
Security
, ,
Server
108.167.172.120 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
gator4257.hostgator.com
Software
Apache /
Resource Hash
92329e1c0e940b0e06a166e60fbc84002c5e03d60e37937c97e4bd6989cdddb6

Request headers

Referer
http://paypal.server42342.com/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:14:52 GMT
Last-Modified
Wed, 07 Aug 2019 21:14:12 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=72
Content-Length
8475

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

0 Cookies