xp-paypalservicecase.com Open in urlscan Pro
173.254.243.2  Malicious Activity! Public Scan

URL: https://xp-paypalservicecase.com/myaccount/
Submission: On January 14 via manual from US

Summary

This website contacted 2 IPs in 1 countries across 3 domains to perform 17 HTTP transactions. The main IP is 173.254.243.2, located in Los Angeles, United States and belongs to ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US. The main domain is xp-paypalservicecase.com.
TLS certificate: Issued by xp-paypalservicecase.com on January 14th 2019. Valid for: a year.
This is the only time xp-paypalservicecase.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
13 173.254.243.2 8100 (ASN-QUADR...)
4 23.210.248.226 16625 (AKAMAI-AS)
17 2
Domain Requested by
13 xp-paypalservicecase.com xp-paypalservicecase.com
3 www.paypalobjects.com xp-paypalservicecase.com
1 t.paypal.com
17 3

This site contains links to these domains. Also see Links.

Domain
www.paypal.com
Subject Issuer Validity Valid
xp-paypalservicecase.com
xp-paypalservicecase.com
2019-01-14 -
2020-01-14
a year crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2018-08-14 -
2020-08-18
2 years crt.sh

This page contains 1 frames:

Primary Page: https://xp-paypalservicecase.com/myaccount/
Frame ID: DC628DCF469A2F0EB5B7C90C4ED1414C
Requests: 17 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^LiteSpeed$/i

Overall confidence: 100%
Detected patterns
  • env /^PAYPAL$/i

Overall confidence: 100%
Detected patterns
  • script /require.*\.js/i
  • env /^requirejs$/i

Overall confidence: 100%
Detected patterns
  • env /^s_(?:account|objectID|code|INST)$/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

17
Requests

24 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

2
IPs

1
Countries

296 kB
Transfer

1120 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

17 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
xp-paypalservicecase.com/myaccount/
10 KB
4 KB
Document
General
Full URL
https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed / PHP/5.6.40
Resource Hash
0caa1e31dd25f48dc7110b17df9559caeb3c2a54c191c8745a36f5600e3b28ee

Request headers

:method
GET
:authority
xp-paypalservicecase.com
:scheme
https
:path
/myaccount/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
x-powered-by
PHP/5.6.40
content-type
text/html; charset=UTF-8
content-encoding
gzip
vary
Accept-Encoding
date
Mon, 14 Jan 2019 20:38:59 GMT
accept-ranges
bytes
server
LiteSpeed
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
app.css
xp-paypalservicecase.com/Suspicious_files/
172 KB
25 KB
Stylesheet
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/app.css
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
417c9a56495a1a8c7022f358df0f3c265f6d5e7eb2a3452a5f52cb5b7983bf4c

Request headers

:path
/Suspicious_files/app.css
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Thu, 22 Sep 2016 04:06:52 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
25934
expires
Mon, 21 Jan 2019 20:39:00 GMT
app.js
xp-paypalservicecase.com/Suspicious_files/
382 KB
103 KB
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/app.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
0a8c7553b10d35e2a00d78f83fe564c11d92deca635cda10580766b51ac47fd9

Request headers

:path
/Suspicious_files/app.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
104867
expires
Mon, 21 Jan 2019 20:39:00 GMT
config.js
xp-paypalservicecase.com/Suspicious_files/
600 B
346 B
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/config.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
05b3965cbe7889bbba309939196020bc0d3d935a5d185d82f7df429f389f9696

Request headers

:path
/Suspicious_files/config.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
303
expires
Mon, 21 Jan 2019 20:39:00 GMT
activity.js
xp-paypalservicecase.com/Suspicious_files/
1 B
40 B
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/activity.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
41b805ea7ac014e23556e98bb374702a08344268f92489a02f0880849394a1e4

Request headers

:path
/Suspicious_files/activity.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
1
expires
Mon, 21 Jan 2019 20:39:00 GMT
translateelement.css
xp-paypalservicecase.com/Suspicious_files/
17 KB
3 KB
Stylesheet
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/translateelement.css
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
89b95375e63b25663cc6e1c7304acc78439a961f9be4d3b7810fe50d57eb3f76

Request headers

:path
/Suspicious_files/translateelement.css
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
3070
expires
Mon, 21 Jan 2019 20:39:00 GMT
logo_paypal_106x29.png
xp-paypalservicecase.com/Suspicious_files/
5 KB
5 KB
Image
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/logo_paypal_106x29.png
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
ab39e6288837a25d62b740906db369081f38978b23570148c28ed41f509d4fe2

Request headers

:path
/Suspicious_files/logo_paypal_106x29.png
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
content-type
image/png
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
4699
expires
Mon, 21 Jan 2019 20:39:00 GMT
peek-shield-logo.png
xp-paypalservicecase.com/Suspicious_files/
4 KB
4 KB
Image
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/peek-shield-logo.png
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
6c24e9fc3844d713e81e8182d435b1ec16df0b291e559742c5842f995b2e0498

Request headers

:path
/Suspicious_files/peek-shield-logo.png
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
content-type
image/png
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
4440
expires
Mon, 21 Jan 2019 20:39:00 GMT
require-spinner.js
xp-paypalservicecase.com/Suspicious_files/
6 KB
3 KB
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/require-spinner.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
9c0821da2aee265221ce1c392604dd4b0901e2f671b87c6c7d141e8f698d4ca7

Request headers

:path
/Suspicious_files/require-spinner.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
2546
expires
Mon, 21 Jan 2019 20:39:00 GMT
require.js
xp-paypalservicecase.com/Suspicious_files/
15 KB
6 KB
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/require.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0

Request headers

:path
/Suspicious_files/require.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
5796
expires
Mon, 21 Jan 2019 20:39:00 GMT
pp_jscode_080706.js
xp-paypalservicecase.com/Suspicious_files/
60 KB
22 KB
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/pp_jscode_080706.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
9bbf1ce51d9751054757ff383e410a379a4b1ee26527334f4add83fbfba1d36c

Request headers

:path
/Suspicious_files/pp_jscode_080706.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
22534
expires
Mon, 21 Jan 2019 20:39:00 GMT
pa.js
xp-paypalservicecase.com/Suspicious_files/
66 KB
11 KB
Script
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/pa.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
98ecaad59fce14516bd1c79d6361e1f798a6cf3d077b68b5807adc153c5fb389

Request headers

:path
/Suspicious_files/pa.js
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
br
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
10944
expires
Mon, 21 Jan 2019 20:39:00 GMT
translate_24dp.png
xp-paypalservicecase.com/Suspicious_files/
825 B
866 B
Image
General
Full URL
https://xp-paypalservicecase.com/Suspicious_files/translate_24dp.png
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/myaccount/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
173.254.243.2 Los Angeles, United States, ASN8100 (ASN-QUADRANET-GLOBAL - QuadraNet Enterprises LLC, US),
Reverse DNS
liberty.theserverdns.com
Software
LiteSpeed /
Resource Hash
1bb2279aed6bc1438d2b17a5ffcbac9d37864582aedeeec8d301eab162b2c213

Request headers

:path
/Suspicious_files/translate_24dp.png
pragma
no-cache
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
xp-paypalservicecase.com
referer
https://xp-paypalservicecase.com/myaccount/
:scheme
https
:method
GET
Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
last-modified
Sun, 25 Oct 2015 10:29:28 GMT
server
LiteSpeed
content-type
image/png
status
200
cache-control
public, max-age=604800
accept-ranges
bytes
alt-svc
quic=":443"; ma=2592000; v="35,37,38,39"
content-length
825
expires
Mon, 21 Jan 2019 20:39:00 GMT
app.js
www.paypalobjects.com/web/res/7a7/dd87ef7a2afbb69dece5be488ad19/js/
382 KB
108 KB
Script
General
Full URL
https://www.paypalobjects.com/web/res/7a7/dd87ef7a2afbb69dece5be488ad19/js/app.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/Suspicious_files/require.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.210.248.226 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-226.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
0a8c7553b10d35e2a00d78f83fe564c11d92deca635cda10580766b51ac47fd9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
strict-transport-security
max-age=31536000
content-length
109967
last-modified
Thu, 08 Oct 2015 09:16:07 GMT
server
Apache
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=7776000
accept-ranges
bytes
access-control-allow-headers
x-csrf-token
expires
Sun, 14 Apr 2019 20:39:00 GMT
config.js
www.paypalobjects.com/web/res/7a7/dd87ef7a2afbb69dece5be488ad19/js/
600 B
600 B
Script
General
Full URL
https://www.paypalobjects.com/web/res/7a7/dd87ef7a2afbb69dece5be488ad19/js/config.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/Suspicious_files/require.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.210.248.226 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-226.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
05b3965cbe7889bbba309939196020bc0d3d935a5d185d82f7df429f389f9696
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
content-encoding
gzip
x-content-type-options
nosniff
status
200
strict-transport-security
max-age=31536000
content-length
318
last-modified
Thu, 08 Oct 2015 09:16:07 GMT
server
Apache
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/x-javascript
access-control-allow-origin
*
cache-control
max-age=7776000
accept-ranges
bytes
access-control-allow-headers
x-csrf-token
expires
Sun, 14 Apr 2019 20:39:00 GMT
activity.js
www.paypalobjects.com/web/res/7a7/dd87ef7a2afbb69dece5be488ad19/js/view/s12n/ato/
1 B
275 B
Script
General
Full URL
https://www.paypalobjects.com/web/res/7a7/dd87ef7a2afbb69dece5be488ad19/js/view/s12n/ato/activity.js
Requested by
Host: xp-paypalservicecase.com
URL: https://xp-paypalservicecase.com/Suspicious_files/require.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.210.248.226 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-226.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
41b805ea7ac014e23556e98bb374702a08344268f92489a02f0880849394a1e4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

date
Mon, 14 Jan 2019 20:39:00 GMT
x-content-type-options
nosniff
last-modified
Thu, 08 Oct 2015 09:16:09 GMT
server
Apache
access-control-allow-origin
*
vary
Accept-Encoding
access-control-allow-methods
GET
content-type
application/x-javascript
status
200
cache-control
max-age=7776000
strict-transport-security
max-age=31536000
accept-ranges
bytes
access-control-allow-headers
x-csrf-token
content-length
1
expires
Sun, 14 Apr 2019 20:39:00 GMT
ts
t.paypal.com/
42 B
494 B
Image
General
Full URL
https://t.paypal.com/ts?v=0.1&t=1547498341372&g=0&e=im&pgrp=main%3Asafe%3Arestriction%3Agrey-user%3A%3Aactivity&page=main%3Asafe%3Arestriction%3Agrey-user%3A%3Aactivity&tmpl=main%3Asafe%3Arestriction%3Agrey-user%3A%3Aactivity&pgst=1445743757471&calc=e27a076b6ee79&rsta=ja_JP&pgtf=Nodejs&s=ci&csci=421f92fc012d42779ac376914d59cfa2&comp=secureflownodeweb&tsrce=secureflownodeweb&pt=Suspicious%20actvity%20-%20PayPal&cd=24&sw=1600&sh=1200&bw=1600&bh=1200&ce=1&t1=406&t1c=406&t1d=15&t1s=227&t2=851&t3=1&t4d=1029&t4=1033&t4e=4&tt=2293
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.210.248.226 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-210-248-226.deploy.static.akamaitechnologies.com
Software
akka-http/10.1.5 /
Resource Hash
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93

Request headers

Referer
https://xp-paypalservicecase.com/myaccount/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 14 Jan 2019 20:39:01 GMT
server
akka-http/10.1.5
p3p
policyref="https://t.paypal.com/w3c/p3p.xml",CP="CAO IND OUR SAM UNI STA COR COM"
status
200
http_x_pp_az_locator
slcb.slc
cache-control
max-age=0, no-cache, no-store
content-type
image/gif
content-length
42
expires
Mon, 14 Jan 2019 20:39:01 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

35 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| RequireSpinners function| Spinner function| requirejs function| require function| define string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code undefined| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| $ function| jQuery object| dust object| jQuery111007017116015608165 object| PAYPAL object| fpti string| fptiserverurl object| jQuery1110059009184617422

1 Cookies

Domain/Path Name / Value
.xp-paypalservicecase.com/ Name: s_sess
Value: %20s_ppv%3D100%3B

1 Console Messages

Source Level URL
Text
console-api log URL: https://xp-paypalservicecase.com/myaccount/(Line 47)
Message:
view/s12n/ato/activity loaded.