Submitted URL: https://ytbe.co/6URXy
Effective URL: http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Submission: On July 13 via manual from US

Summary

This website contacted 3 IPs in 4 countries across 4 domains to perform 4 HTTP transactions. The main IP is 141.8.194.64, located in Moscow, Russian Federation and belongs to SPRINTHOST, RU. The main domain is a0220353.xsph.ru.
This is the only time a0220353.xsph.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 2001:8d8:100f... 8560 (ONEANDONE...)
4 6 141.8.194.64 35278 (SPRINTHOST)
1 205.185.208.52 20446 (HIGHWINDS3)
1 2.18.233.20 16625 (AKAMAI-AS)
4 3
Apex Domain
Subdomains
Transfer
6 xsph.ru
a0220353.xsph.ru
8 KB
1 paypalobjects.com
www.paypalobjects.com
5 KB
1 jquery.com
code.jquery.com
34 KB
1 ytbe.co
ytbe.co
357 B
4 4
Domain Requested by
6 a0220353.xsph.ru 4 redirects a0220353.xsph.ru
1 www.paypalobjects.com a0220353.xsph.ru
1 code.jquery.com a0220353.xsph.ru
1 ytbe.co 1 redirects
4 4

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Frame ID: 3991F05AA08B0E86B9B8E79D299C6097
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://ytbe.co/6URXy HTTP 301
    http://a0220353.xsph.ru/paypall HTTP 301
    http://a0220353.xsph.ru/paypall/ HTTP 302
    http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326 HTTP 301
    http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/ HTTP 302
    http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

4
Requests

0 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

3
IPs

4
Countries

46 kB
Transfer

114 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://ytbe.co/6URXy HTTP 301
    http://a0220353.xsph.ru/paypall HTTP 301
    http://a0220353.xsph.ru/paypall/ HTTP 302
    http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326 HTTP 301
    http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/ HTTP 302
    http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/
Redirect Chain
  • https://ytbe.co/6URXy
  • http://a0220353.xsph.ru/paypall
  • http://a0220353.xsph.ru/paypall/
  • http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326
  • http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/
  • http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
3 KB
1 KB
Document
General
Full URL
http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Server
141.8.194.64 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
menglod.from.sh
Software
openresty /
Resource Hash
117234e2ad862684364a516688e6e1e47fd20f1adcd00c786c76e237134cd59e

Request headers

Host
a0220353.xsph.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
3991F05AA08B0E86B9B8E79D299C6097

Response headers

Server
openresty
Date
Fri, 13 Jul 2018 16:47:06 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Content-Encoding
gzip

Redirect headers

Server
openresty
Date
Fri, 13 Jul 2018 16:47:06 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
0
Connection
keep-alive
location
signin/?country.x=&locale.x=_
style.css
a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/css/
24 KB
6 KB
Stylesheet
General
Full URL
http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/css/style.css
Requested by
Host: a0220353.xsph.ru
URL: http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Server
141.8.194.64 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
menglod.from.sh
Software
openresty /
Resource Hash
562e585efab210b7cbdb49a5f72814f7d561486e7368159e1ef38531d38afc88

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
a0220353.xsph.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Connection
keep-alive
Cache-Control
no-cache
Referer
http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 13 Jul 2018 16:47:06 GMT
Content-Encoding
gzip
Last-Modified
Fri, 13 Jul 2018 16:47:05 GMT
Server
openresty
ETag
W/"5b48d789-61de"
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Fri, 20 Jul 2018 16:47:06 GMT
jquery-2.1.4.min.js
code.jquery.com/
82 KB
34 KB
Script
General
Full URL
http://code.jquery.com/jquery-2.1.4.min.js
Requested by
Host: a0220353.xsph.ru
URL: http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
f16ab224bb962910558715c82f58c10c3ed20f153ddfaa199029f141b5b0255c

Request headers

Referer
http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Fri, 13 Jul 2018 16:47:06 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Apr 2015 16:17:08 GMT
Server
nginx
ETag
"553fb284-14979"
Vary
Accept-Encoding
X-HW
1531500426.dop001.fr8.t,1531500426.cds048.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
34418
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: a0220353.xsph.ru
URL: http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/signin/?country.x=&locale.x=_
Protocol
SPDY
Server
2.18.233.20 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-233-20.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://a0220353.xsph.ru/paypall/261b5b3fefd965aa945289857d79a326/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Fri, 13 Jul 2018 16:47:06 GMT
x-content-type-options
nosniff
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
strict-transport-security
max-age=31536000
accept-ranges
bytes
content-length
4945
expires
Sun, 12 Aug 2018 16:47:06 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery

0 Cookies