f0473678.xsph.ru Open in urlscan Pro
2a0a:2b43:9:5f::  Malicious Activity! Public Scan

URL: http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
Submission Tags: phishing malicious Search All
Submission: On September 28 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 2a0a:2b43:9:5f::, located in Russian Federation and belongs to SPRINTHOST, RU. The main domain is f0473678.xsph.ru.
This is the only time f0473678.xsph.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
4 2a0a:2b43:9:5f:: 35278 (SPRINTHOST)
1 2 2a00:1450:400... 15169 (GOOGLE)
5 2
Apex Domain
Subdomains
Transfer
4 xsph.ru
f0473678.xsph.ru
42 KB
2 blogspot.com
beltornado2020.blogspot.com
436 B
5 2
Domain Requested by
4 f0473678.xsph.ru f0473678.xsph.ru
2 beltornado2020.blogspot.com 1 redirects f0473678.xsph.ru
5 2

This site contains no links.

Subject Issuer Validity Valid
misc-sni.blogspot.com
GTS CA 1O1
2020-09-03 -
2020-11-26
3 months crt.sh

This page contains 1 frames:

Primary Page: http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
Frame ID: DEB6D7BB00942CBA98B3AC59774020B7
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Page Statistics

5
Requests

20 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

42 kB
Transfer

114 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 2
  • http://beltornado2020.blogspot.com/ HTTP 301
  • https://beltornado2020.blogspot.com/

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set signin.php
f0473678.xsph.ru/paypal/u4ywq=/app/
8 KB
3 KB
Document
General
Full URL
http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
Protocol
HTTP/1.1
Server
2a0a:2b43:9:5f:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
708f3aab59e1bc6f28482413f261fadaf004b90691448111e2b6662d69083b2c
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Host
f0473678.xsph.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Server
openresty
Date
Mon, 28 Sep 2020 04:47:54 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Set-Cookie
PHPSESSID=c4c0b04ea5bd1418802c783d3330b98b; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Content-Encoding
gzip
login.css
f0473678.xsph.ru/paypal/u4ywq=/assets/css/
16 KB
4 KB
Stylesheet
General
Full URL
http://f0473678.xsph.ru/paypal/u4ywq=/assets/css/login.css
Requested by
Host: f0473678.xsph.ru
URL: http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
Protocol
HTTP/1.1
Server
2a0a:2b43:9:5f:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
1663f95ea0126d1a415ee9ca499b8a137e542346004234a0c3df869b4b9b1a13

Request headers

Referer
http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 04:47:54 GMT
Content-Encoding
gzip
Last-Modified
Sun, 27 Sep 2020 01:04:38 GMT
Server
openresty
ETag
W/"5f6fe526-3e3c"
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Mon, 05 Oct 2020 04:47:54 GMT
jquery.min.js
f0473678.xsph.ru/paypal/u4ywq=/assets/js/
85 KB
33 KB
Script
General
Full URL
http://f0473678.xsph.ru/paypal/u4ywq=/assets/js/jquery.min.js
Requested by
Host: f0473678.xsph.ru
URL: http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
Protocol
HTTP/1.1
Server
2a0a:2b43:9:5f:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
d3a518dea876de39f9e5dc1ffcdeb6c661aee25d8a62474386b664ef3bf1b40f

Request headers

Referer
http://f0473678.xsph.ru/paypal/u4ywq=/app/signin.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 04:47:54 GMT
Content-Encoding
gzip
Last-Modified
Sun, 27 Sep 2020 01:04:38 GMT
Server
openresty
ETag
W/"5f6fe526-15285"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Mon, 05 Oct 2020 04:47:54 GMT
/
beltornado2020.blogspot.com/
Redirect Chain
  • http://beltornado2020.blogspot.com/
  • https://beltornado2020.blogspot.com/
0
0
Image
General
Full URL
https://beltornado2020.blogspot.com/
Requested by
Host: f0473678.xsph.ru
URL: http://f0473678.xsph.ru/paypal/u4ywq=/assets/css/login.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://f0473678.xsph.ru/paypal/u4ywq=/assets/css/login.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Redirect headers

Date
Mon, 28 Sep 2020 04:47:54 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
Server
GSE
X-Frame-Options
SAMEORIGIN
Content-Type
text/html; charset=UTF-8
Location
https://beltornado2020.blogspot.com/
Cache-Control
private, max-age=0
Content-Security-Policy
frame-ancestors 'self'
Content-Length
182
X-XSS-Protection
1; mode=block
Expires
Mon, 28 Sep 2020 04:47:54 GMT
big.svg
f0473678.xsph.ru/paypal/u4ywq=/assets/img/
5 KB
2 KB
Image
General
Full URL
http://f0473678.xsph.ru/paypal/u4ywq=/assets/img/big.svg
Requested by
Host: f0473678.xsph.ru
URL: http://f0473678.xsph.ru/paypal/u4ywq=/assets/css/login.css
Protocol
HTTP/1.1
Server
2a0a:2b43:9:5f:: , Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
Software
openresty /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
http://f0473678.xsph.ru/paypal/u4ywq=/assets/css/login.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Mon, 28 Sep 2020 04:47:54 GMT
Content-Encoding
gzip
Last-Modified
Sun, 27 Sep 2020 01:04:38 GMT
Server
openresty
ETag
W/"5f6fe526-1351"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Mon, 05 Oct 2020 04:47:54 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes function| $ function| jQuery function| validatePayForm

1 Cookies

Domain/Path Name / Value
f0473678.xsph.ru/ Name: PHPSESSID
Value: c4c0b04ea5bd1418802c783d3330b98b

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block