www.paypal.account.login.seko.berryress.net Open in urlscan Pro
91.206.15.239  Public Scan

URL: https://www.paypal.account.login.seko.berryress.net/
Submission: On May 20 via automatic, source certstream-suspicious

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 91.206.15.239, located in Russian Federation and belongs to SELECTEL, RU. The main domain is www.paypal.account.login.seko.berryress.net.
TLS certificate: Issued by Let's Encrypt Authority X3 on May 20th 2019. Valid for: 3 months.
This is the only time www.paypal.account.login.seko.berryress.net was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 91.206.15.239 49505 (SELECTEL)
1 1
Apex Domain
Subdomains
Transfer
1 berryress.net
www.paypal.account.login.seko.berryress.net
816 B
1 1

This site contains no links.

Subject Issuer Validity Valid
paypal.account.login.seko.berryress.net
Let's Encrypt Authority X3
2019-05-20 -
2019-08-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://www.paypal.account.login.seko.berryress.net/
Frame ID: CE549D55AC17C189107A1B253A0F1756
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1 kB
Transfer

1 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.paypal.account.login.seko.berryress.net/
623 B
816 B
Document
General
Full URL
https://www.paypal.account.login.seko.berryress.net/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
91.206.15.239 , Russian Federation, ASN49505 (SELECTEL, RU),
Reverse DNS
Software
Apache /
Resource Hash
eaf73a38ab99f8a8357de484af875a42b794ad66ec1967ce77b673a504cb16e6

Request headers

Host
www.paypal.account.login.seko.berryress.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Mon, 20 May 2019 19:19:29 GMT
Server
Apache
Content-Length
623
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html;charset=ISO-8859-1

Verdicts & Comments Add Verdict or Comment

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

www.paypal.account.login.seko.berryress.net
91.206.15.239
eaf73a38ab99f8a8357de484af875a42b794ad66ec1967ce77b673a504cb16e6