paypalverif0xzzx0.ddns.net Open in urlscan Pro
13.76.186.145  Malicious Activity! Public Scan

URL: http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Submission Tags: phishing malicious Search All
Submission: On October 23 via api from US

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 4 HTTP transactions. The main IP is 13.76.186.145, located in Singapore, Singapore and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is paypalverif0xzzx0.ddns.net.
This is the only time paypalverif0xzzx0.ddns.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
2 13.76.186.145 8075 (MICROSOFT...)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
1 151.101.14.133 54113 (FASTLY)
4 3
Domain Requested by
2 paypalverif0xzzx0.ddns.net paypalverif0xzzx0.ddns.net
1 www.paypalobjects.com paypalverif0xzzx0.ddns.net
1 code.jquery.com paypalverif0xzzx0.ddns.net
4 3

This site contains no links.

Subject Issuer Validity Valid
www.paypalobjects.com
DigiCert SHA2 Extended Validation Server CA
2019-12-09 -
2021-12-13
2 years crt.sh

This page contains 1 frames:

Primary Page: http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Frame ID: B54C14705AFE9FF3A1C17B5F66AB5E64
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

4
Requests

25 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

58 kB
Transfer

114 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/
3 KB
1 KB
Document
General
Full URL
http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Server
13.76.186.145 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
95dedf6721219e0690612d1396a8091f2157f28407294628ee09ea5a03aab031

Request headers

Host
paypalverif0xzzx0.ddns.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:44:43 GMT
Server
Apache
Content-Encoding
gzip
Vary
Accept-Encoding
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.css
paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/
24 KB
25 KB
Stylesheet
General
Full URL
http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/style.css
Requested by
Host: paypalverif0xzzx0.ddns.net
URL: http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Server
13.76.186.145 Singapore, Singapore, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache /
Resource Hash
562e585efab210b7cbdb49a5f72814f7d561486e7368159e1ef38531d38afc88

Request headers

Referer
http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:44:43 GMT
Last-Modified
Thu, 22 Oct 2020 14:02:22 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
25054
jquery-2.1.4.min.js
code.jquery.com/
82 KB
29 KB
Script
General
Full URL
http://code.jquery.com/jquery-2.1.4.min.js
Requested by
Host: paypalverif0xzzx0.ddns.net
URL: http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
Protocol
HTTP/1.1
Server
2001:4de0:ac19::1:b:3b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
f16ab224bb962910558715c82f58c10c3ed20f153ddfaa199029f141b5b0255c

Request headers

Referer
http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/signin/?country.x=&locale.x=_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Fri, 23 Oct 2020 01:44:43 GMT
Content-Encoding
gzip
Last-Modified
Tue, 28 Apr 2015 16:17:08 GMT
Server
nginx
ETag
W/"553fb284-14979"
Vary
Accept-Encoding
X-HW
1603417483.dop167.fr8.t,1603417483.cds244.fr8.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
29519
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: paypalverif0xzzx0.ddns.net
URL: http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/style.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Referer
http://paypalverif0xzzx0.ddns.net/4157bf6ae5a073ed7897dfcffb7aab4c/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Fri, 23 Oct 2020 01:44:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
18684667
x-cache
HIT, HIT
status
200
surrorage-key
/images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared /images
vary
Accept-Encoding
content-length
1929
via
1.1 varnish, 1.1 varnish
x-served-by
cache-sjc10023-SJC, cache-fra19151-FRA
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
x-timer
S1603417484.982163,VS0,VE0
strict-transport-security
max-age=31557600
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
55199, 257211

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| $ function| jQuery

0 Cookies