paypellog45.000webhostapp.com Open in urlscan Pro
145.14.144.171  Malicious Activity! Public Scan

URL: http://paypellog45.000webhostapp.com/
Submission Tags: phishing malicious Search All
Submission: On October 23 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 1 countries across 4 domains to perform 4 HTTP transactions. The main IP is 145.14.144.171, located in United States and belongs to AWEX, CY. The main domain is paypellog45.000webhostapp.com.
This is the only time paypellog45.000webhostapp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 145.14.144.171 204915 (AWEX)
1 69.16.175.10 33438 (HIGHWINDS2)
1 151.101.2.133 54113 (FASTLY)
1 104.19.185.120 13335 (CLOUDFLAR...)
4 4
Domain Requested by
1 cdn.000webhost.com paypellog45.000webhostapp.com
1 www.paypalobjects.com paypellog45.000webhostapp.com
1 code.jquery.com paypellog45.000webhostapp.com
1 paypellog45.000webhostapp.com
4 4

This site contains links to these domains. Also see Links.

Domain
www.000webhost.com
Subject Issuer Validity Valid
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh
www.paypalobjects.com
DigiCert SHA2 Extended Validation Server CA
2021-04-29 -
2021-12-13
8 months crt.sh
*.000webhost.com
Sectigo RSA Domain Validation Secure Server CA
2020-12-14 -
2022-01-14
a year crt.sh

This page contains 1 frames:

Primary Page: http://paypellog45.000webhostapp.com/
Frame ID: 7347C646A7D4D3E2C825FB3A69634B63
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • paypalobjects\.com

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

4
Requests

75 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

4
IPs

1
Countries

39 kB
Transfer

111 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
paypellog45.000webhostapp.com/
21 KB
5 KB
Document
General
Full URL
http://paypellog45.000webhostapp.com/
Protocol
HTTP/1.1
Server
145.14.144.171 , United States, ASN204915 (AWEX, CY),
Reverse DNS
Software
awex /
Resource Hash
559007ed103ff3270f31583fb7be93bd9a7414d86224c2400c1970a1d92110d1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
paypellog45.000webhostapp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Date
Sat, 23 Oct 2021 01:09:29 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Server
awex
X-Xss-Protection
1; mode=block
X-Content-Type-Options
nosniff
X-Request-ID
baf4c81e6065e75da4ac06372286ad0a
Content-Encoding
gzip
jquery-3.6.0.min.js
code.jquery.com/
87 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.6.0.min.js
Requested by
Host: paypellog45.000webhostapp.com
URL: http://paypellog45.000webhostapp.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
69.16.175.10 Phoenix, United States, ASN33438 (HIGHWINDS2, US),
Reverse DNS
tlb.hwcdn.net
Software
nginx /
Resource Hash
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e

Request headers

Referer
http://paypellog45.000webhostapp.com/
Origin
http://paypellog45.000webhostapp.com
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sat, 23 Oct 2021 01:09:29 GMT
content-encoding
gzip
last-modified
Tue, 02 Mar 2021 17:27:20 GMT
server
nginx
etag
W/"603e7578-15d9d"
vary
Accept-Encoding
x-hw
1634951369.dop247.am5.t,1634951369.cds267.am5.hn,1634951369.cds007.am5.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30875
paypal-logo-129x32.png
www.paypalobjects.com/images/shared/
1 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.png
Requested by
Host: paypellog45.000webhostapp.com
URL: http://paypellog45.000webhostapp.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.2.133 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
44f0b4812a9cb38bec1359acc0e4e310bcaaa79c203d19a55bc166123c60973c
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://paypellog45.000webhostapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sat, 23 Oct 2021 01:09:29 GMT
via
1.1 varnish, 1.1 varnish
x-content-type-options
nosniff
x-cache
HIT, HIT
fastly-io-info
ifsz=1610 idim=129x32 ifmt=png ofsz=1172 odim=129x32 ofmt=png
paypal-debug-id
bac0ad7a597a7
fastly-stats
io=1
dc
phx-origin-www-1.paypal.com
content-length
1172
x-served-by
cache-sjc10021-SJC, cache-hhn4059-HHN
x-timer
S1634951369.234975,VS0,VE146
etag
"eedq4JBGNI7A+IEsCwacAz/OnYg42o6U+EUhes5uvCU"
strict-transport-security
max-age=31557600
content-type
image/png
cache-control
public,max-age=3600
accept-ranges
bytes
x-cache-hits
2, 1
footer-powered-by-000webhost-white2.png
cdn.000webhost.com/000webhost/logo/
2 KB
2 KB
Image
General
Full URL
https://cdn.000webhost.com/000webhost/logo/footer-powered-by-000webhost-white2.png
Requested by
Host: paypellog45.000webhostapp.com
URL: http://paypellog45.000webhostapp.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.19.185.120 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
86f2673ec74a632865109a76b2232f4f5b3587daa219e07a17ef1d9c76a0fda5
Security Headers
Name Value
Strict-Transport-Security max-age=2592000
X-Content-Type-Options nosniff
X-Frame-Options sameorigin
X-Xss-Protection 1; mode=block

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
http://paypellog45.000webhostapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

date
Sat, 23 Oct 2021 01:09:29 GMT
x-content-type-options
nosniff
cf-cache-status
HIT
age
6184
cf-polished
origFmt=png, origSize=2046
content-disposition
inline; filename="footer-powered-by-000webhost-white2.webp"
cf-bgj
imgq:100,h2pri
x-hostinger-datacenter
srv
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400, h3-28=":443"; ma=86400, h3-27=":443"; ma=86400
content-length
1696
x-xss-protection
1; mode=block
last-modified
Mon, 18 Oct 2021 13:55:18 GMT
server
cloudflare
x-frame-options
sameorigin
etag
"616d7cc6-7fe"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=2592000
content-type
image/webp
vary
Accept
cache-control
public, max-age=14400
x-hostinger-node
nl-srv-cdn1
accept-ranges
bytes
cf-ray
6a271489ecf421ab-DUS
expires
Sat, 23 Oct 2021 05:09:29 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

23 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery function| getCookie undefined| wordpressAdminBody object| notification object| hostingerLogo undefined| mainContent undefined| googleFont undefined| css undefined| style undefined| sheet undefined| button undefined| link undefined| mainContentHolder undefined| h1Tag undefined| h2Tag undefined| paragraph undefined| list undefined| org_html undefined| new_html undefined| saleImage

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block