unusua-activity.pypal.koersusgoereng.com Open in urlscan Pro
162.241.115.116  Malicious Activity! Public Scan

Submitted URL: https://u10160505.ct.sendgrid.net/ls/click?upn=DAqWShMpGo08coupILmuxvmeZ6BdVivhQZKsVkupsQE-3DowUn_yBmPhtngCkljXfTJH4vRBl2qIfIvZRVc...
Effective URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Submission Tags: phishing malicious Search All
Submission: On July 28 via api from US

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 11 HTTP transactions. The main IP is 162.241.115.116, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is unusua-activity.pypal.koersusgoereng.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 24th 2020. Valid for: 3 months.
This is the only time unusua-activity.pypal.koersusgoereng.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.123.16 11377 (SENDGRID)
2 45.126.59.196 132647 (IDNIC-PAN...)
1 9 162.241.115.116 46606 (UNIFIEDLA...)
11 3
Apex Domain
Subdomains
Transfer
9 koersusgoereng.com
unusua-activity.pypal.koersusgoereng.com
238 KB
2 s.id
s.id
analytics.s.id
25 KB
1 sendgrid.net
u10160505.ct.sendgrid.net
221 B
11 3
Domain Requested by
9 unusua-activity.pypal.koersusgoereng.com 1 redirects s.id
unusua-activity.pypal.koersusgoereng.com
1 analytics.s.id s.id
1 s.id
1 u10160505.ct.sendgrid.net 1 redirects
11 4

This site contains no links.

Subject Issuer Validity Valid
*.s.id
Let's Encrypt Authority X3
2020-06-28 -
2020-09-26
3 months crt.sh
unusua-activity.pypal.koersusgoereng.com
cPanel, Inc. Certification Authority
2020-07-24 -
2020-10-22
3 months crt.sh

This page contains 1 frames:

Primary Page: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Frame ID: A5484FD5F62B78E71AE57E50AA625561
Requests: 11 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://u10160505.ct.sendgrid.net/ls/click?upn=DAqWShMpGo08coupILmuxvmeZ6BdVivhQZKsVkupsQE-3DowUn_yBmPhtngCklj... HTTP 302
    https://s.id/nrgPH Page URL
  2. https://unusua-activity.pypal.koersusgoereng.com/?_d1xm3k1 HTTP 302
    https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Ubuntu/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

11
Requests

91 %
HTTPS

0 %
IPv6

3
Domains

4
Subdomains

3
IPs

2
Countries

263 kB
Transfer

305 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://u10160505.ct.sendgrid.net/ls/click?upn=DAqWShMpGo08coupILmuxvmeZ6BdVivhQZKsVkupsQE-3DowUn_yBmPhtngCkljXfTJH4vRBl2qIfIvZRVcPqvOR9uvfIuBC3rWAkzFkuVctyiMHa2YeXdeFjHgeJLbIIyKH-2F6vK5KHaVs3EahnGtgtZyO958-2FdOcWIJnI4uQ4cTQ3ARwT8oY8BSM6biczzOe2h61xMA-2B-2BmLvLlKWcS5HrH3zgAKQqRPZ-2BT217hypnIieUvTJzFycpJyKnB-2FSptElneo52RCs5jVBxSngPQHBXk7WOYeOA-3D HTTP 302
    https://s.id/nrgPH Page URL
  2. https://unusua-activity.pypal.koersusgoereng.com/?_d1xm3k1 HTTP 302
    https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • https://u10160505.ct.sendgrid.net/ls/click?upn=DAqWShMpGo08coupILmuxvmeZ6BdVivhQZKsVkupsQE-3DowUn_yBmPhtngCkljXfTJH4vRBl2qIfIvZRVcPqvOR9uvfIuBC3rWAkzFkuVctyiMHa2YeXdeFjHgeJLbIIyKH-2F6vK5KHaVs3EahnGtgtZyO958-2FdOcWIJnI4uQ4cTQ3ARwT8oY8BSM6biczzOe2h61xMA-2B-2BmLvLlKWcS5HrH3zgAKQqRPZ-2BT217hypnIieUvTJzFycpJyKnB-2FSptElneo52RCs5jVBxSngPQHBXk7WOYeOA-3D HTTP 302
  • https://s.id/nrgPH

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Cookie set nrgPH
s.id/
Redirect Chain
  • https://u10160505.ct.sendgrid.net/ls/click?upn=DAqWShMpGo08coupILmuxvmeZ6BdVivhQZKsVkupsQE-3DowUn_yBmPhtngCkljXfTJH4vRBl2qIfIvZRVcPqvOR9uvfIuBC3rWAkzFkuVctyiMHa2YeXdeFjHgeJLbIIyKH-2F6vK5KHaVs3EahnG...
  • https://s.id/nrgPH
2 KB
2 KB
Document
General
Full URL
https://s.id/nrgPH
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.126.59.196 , Indonesia, ASN132647 (IDNIC-PANDI-AS-ID Pengelola Nama Domain Internet Indonesia, ID),
Reverse DNS
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash
0a6fbfe3e36741864e901b468469a2bdfcb57d89859f95c9a59fda4c8d233ef3

Request headers

Host
s.id
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
nginx/1.10.3 (Ubuntu)
Date
Tue, 28 Jul 2020 01:44:01 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Cache-Control
private, must-revalidate
pragma
no-cache
expires
-1
Set-Cookie
XSRF-TOKEN=eyJpdiI6IjBtMzhiQzlsUHEzc3pSOUw1b0IwUlE9PSIsInZhbHVlIjoiQWtLQThyeG0xNVFmeStJNWlyZU9kMlRYNjhMYWRHZjlaTVlScHZJMm5FUFRqWHg0a2xiTWFCc2hIb0xNM2J4MDJUYjJcL1Q2dUdqREhqOVRJb1pOdFlnPT0iLCJtYWMiOiI0YzM5OThiYWE5NWJjMTYyM2ExMDE2NGY3MTU3NTQwMmQ2ZGZhYjZhMzk0NWU0MGQ1OTBkNDJkZjdjYzE3NzJlIn0%3D; expires=Tue, 28-Jul-2020 03:44:01 GMT; Max-Age=7200; path=/ major_tom=eyJpdiI6IlErSlg5dlorcXBub0Z6T2tuWEVkZHc9PSIsInZhbHVlIjoid0tYcGNaZGtCeFZ4NGZveHl2OTk1dFwvbzZwekc4Y3hnbU1oSEJFOG95NXVRS2VaMVpqRWcxT0Z3Tkt1SjJVSlMySE8xWXhGeldQXC9zSVJIVCs4Wnd4dz09IiwibWFjIjoiNDUxOTM2ZGZlYWE5MDM5NTM4Mjc5N2E0MmNkZmI0ODZmN2QyOGZmZGY5NzkzOWMxNGE3YWZmYTdhM2RlNzhkZSJ9; expires=Tue, 28-Jul-2020 03:44:01 GMT; Max-Age=7200; path=/; httponly
Content-Encoding
gzip

Redirect headers

Server
nginx
Date
Tue, 28 Jul 2020 01:44:00 GMT
Content-Type
text/html; charset=utf-8
Content-Length
41
Connection
keep-alive
Location
https://s.id/nrgPH
X-Robots-Tag
noindex, nofollow
Primary Request signin
unusua-activity.pypal.koersusgoereng.com/
Redirect Chain
  • https://unusua-activity.pypal.koersusgoereng.com/?_d1xm3k1
  • https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
4 KB
4 KB
Document
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Requested by
Host: s.id
URL: https://s.id/nrgPH
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
6fc8c23195e5d100c20fa304e8e62a03e9e07970f318a00d7813c1a8c960f66d

Request headers

Host
unusua-activity.pypal.koersusgoereng.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
cross-site
Sec-Fetch-Mode
navigate
Sec-Fetch-Dest
document
Referer
https://s.id/nrgPH
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
PHPSESSID=290ff6c6d2096ad201dbbe4c605de826
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://s.id/nrgPH

Response headers

Date
Tue, 28 Jul 2020 01:44:02 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Tue, 28 Jul 2020 01:44:01 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=290ff6c6d2096ad201dbbe4c605de826; path=/
location
signin?country.x=FI&locale.x=en_FI
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
piwik.js
analytics.s.id/
68 KB
23 KB
Script
General
Full URL
https://analytics.s.id/piwik.js
Requested by
Host: s.id
URL: https://s.id/nrgPH
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
45.126.59.196 , Indonesia, ASN132647 (IDNIC-PANDI-AS-ID Pengelola Nama Domain Internet Indonesia, ID),
Reverse DNS
Software
nginx/1.10.3 (Ubuntu) /
Resource Hash

Request headers

Referer
https://s.id/nrgPH
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:03 GMT
Content-Encoding
gzip
Last-Modified
Fri, 05 Jun 2020 00:54:40 GMT
Server
nginx/1.10.3 (Ubuntu)
ETag
W/"5ed997d0-10edb"
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
keep-alive
piwik.php
analytics.s.id/
0
0

signin_style.css
unusua-activity.pypal.koersusgoereng.com/assets/css/
58 KB
59 KB
Stylesheet
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/css/signin_style.css
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
37cfe204bad53204342e9865baa5cb63cab02669d69d479173934b4b971c3c63

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:03 GMT
Last-Modified
Sun, 27 Jan 2019 11:07:58 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
59788
jquery.min.js
unusua-activity.pypal.koersusgoereng.com/assets/js/
125 KB
125 KB
Script
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/js/jquery.min.js
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
f763bcb0fb63903ddd6d99311c4c6316122f0a1262b564059a635c51ac9042c2

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:03 GMT
Last-Modified
Fri, 18 May 2018 18:16:04 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
128148
jquery.validate.js
unusua-activity.pypal.koersusgoereng.com/assets/js/
33 KB
34 KB
Script
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/js/jquery.validate.js
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
01d2a5dfc4fba37311b6db6db1e06b038bffc8d9fd85a9423b9b3d5ddf01f75d

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:03 GMT
Last-Modified
Sun, 27 Jan 2019 11:09:52 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
34282
signin.auth.js
unusua-activity.pypal.koersusgoereng.com/assets/js/
4 KB
4 KB
Script
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/js/signin.auth.js
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
f4d9a25f551723bd23b6b0a3ca75c94cf0beec72d3a9c742a94aee08db212f6a

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:03 GMT
Last-Modified
Sun, 27 Jan 2019 14:32:00 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4110
signin.post.js
unusua-activity.pypal.koersusgoereng.com/assets/js/
1 KB
2 KB
Script
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/js/signin.post.js
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
b6cc0523a52ffee9e6c9da95515b44a1ccf74f8ed71261030045fcf7e010d025

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:03 GMT
Last-Modified
Thu, 14 Jun 2018 06:20:58 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1306
favicon.svg
unusua-activity.pypal.koersusgoereng.com/assets/img/
5 KB
5 KB
Image
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/img/favicon.svg
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/assets/css/signin_style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:04 GMT
Last-Modified
Fri, 18 May 2018 18:16:04 GMT
Server
Apache
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4945
sprite_icon.png
unusua-activity.pypal.koersusgoereng.com/assets/img/
5 KB
5 KB
Image
General
Full URL
https://unusua-activity.pypal.koersusgoereng.com/assets/img/sprite_icon.png
Requested by
Host: unusua-activity.pypal.koersusgoereng.com
URL: https://unusua-activity.pypal.koersusgoereng.com/signin?country.x=FI&locale.x=en_FI
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
162.241.115.116 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
162-241-115-116.unifiedlayer.com
Software
Apache /
Resource Hash
54436312813c5ba0070898ec0ac998a94e0486d12417a8fa4602cc501a94029e

Request headers

Referer
https://unusua-activity.pypal.koersusgoereng.com/assets/css/signin_style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 28 Jul 2020 01:44:04 GMT
Last-Modified
Fri, 18 May 2018 18:16:04 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
4675

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
analytics.s.id
URL
https://analytics.s.id/piwik.php?action_name=s.id%2F&idsite=12&rec=1&r=478032&h=3&m=44&s=3&url=https%3A%2F%2Fs.id%2FnrgPH&_id=348e887cc365ba0e&_idts=1595900644&_idvc=1&_idn=0&_refts=0&_viewts=1595900644&send_image=1&cookie=1&res=1600x1200&dimension1=7de5cfb2-8877-431f-9fae-3b1bdca86727&gt_ms=954&pv_id=EdvR4u

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery function| validateEmail function| ngerandom

1 Cookies

Domain/Path Name / Value
unusua-activity.pypal.koersusgoereng.com/ Name: PHPSESSID
Value: 290ff6c6d2096ad201dbbe4c605de826