![](/screenshots/9b275bfb-2987-41fe-8a4c-3046cc2f79a4.png)
kayt-502.ml
Open in
urlscan Pro
196.203.63.105
Malicious Activity!
Public Scan
Effective URL: http://kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/
Submission: On July 31 via manual from US
Summary
This is the only time kayt-502.ml was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.85.177.152 52.85.177.152 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
2 16 | 196.203.63.105 196.203.63.105 | 37693 (TUNISIANA) (TUNISIANA) | |
16 | 3 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: server-52-85-177-152.fra6.r.cloudfront.net
mail01.tinyletterapp.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
kayt-502.ml
2 redirects
kayt-502.ml |
270 KB |
1 |
tinyletterapp.com
mail01.tinyletterapp.com |
640 B |
0 |
se3curity.com
Failed
binlist.se3curity.com Failed |
|
16 | 3 |
Domain | Requested by | |
---|---|---|
16 | kayt-502.ml |
2 redirects
kayt-502.ml
|
1 | mail01.tinyletterapp.com | |
0 | binlist.se3curity.com Failed |
kayt-502.ml
|
16 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/
Frame ID: 574A9AC0387E63FF555DA3A4F3F5C8F8
Requests: 16 HTTP requests in this frame
Screenshot
![](/screenshots/9b275bfb-2987-41fe-8a4c-3046cc2f79a4.png)
Page URL History Show full URLs
- http://mail01.tinyletterapp.com/HUOPRY/hello-how-are-you/12200729-kayt-502.ml/katyu/?REDACTED Page URL
-
http://kayt-502.ml/KATYU/
HTTP 302
http://kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2Mm... HTTP 301
http://kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2Mm... Page URL
Detected technologies
Detected patterns
- script /jquery\.mobile(?:-([\d.]+rc\d))?.*\.js(?:\?ver=([\d.]+))?/i
Detected patterns
- headers server /AmazonS3/i
Detected patterns
- script /jquery.*\.js/i
- env /^jQuery$/i
- script /jquery\.mobile(?:-([\d.]+rc\d))?.*\.js(?:\?ver=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- http://mail01.tinyletterapp.com/HUOPRY/hello-how-are-you/12200729-kayt-502.ml/katyu/?REDACTED Page URL
-
http://kayt-502.ml/KATYU/
HTTP 302
http://kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM= HTTP 301
http://kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
/
mail01.tinyletterapp.com/HUOPRY/hello-how-are-you/12200729-kayt-502.ml/katyu/ |
175 B 640 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
![]() kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-sans.css
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
template.css
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
8 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
21 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
84 KB 84 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jstz.min.js
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
26 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mobile.custom.min.js
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
35 KB 36 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.browser.min.js
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/file/ |
4 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
visit.php
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/inc/ |
413 B 613 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
title.png
binlist.se3curity.com/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error_icon.png
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/img/ |
809 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo0.svg
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/img/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PayPalSansBig-Regular.woff2
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/font/ |
38 KB 38 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PayPalSansSmall-Regular.woff2
kayt-502.ml/KATYU/7344ad5ebf8ac901e114e6c9b8faeffcNDE0MTg4ZTU1MjQ5MGQ0MGFkZmQ2NTM3OGE2MmQ3ZWM=/font/ |
36 KB 37 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- binlist.se3curity.com
- URL
- http://binlist.se3curity.com/images/title.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| jstz object| jQBrowser1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
kayt-502.ml/ | Name: PHPSESSID Value: afsv40sedtskh7ndp7kidiu044 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
binlist.se3curity.com
kayt-502.ml
mail01.tinyletterapp.com
binlist.se3curity.com
196.203.63.105
52.85.177.152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