mexicoazul.org
Open in
urlscan Pro
162.241.60.239
Malicious Activity!
Public Scan
Effective URL: https://mexicoazul.org/PayPal/?country.x=CH&locale.x=en_CH%3E&client=da6e8bd46e3e9755b760ae5ff25c1d40
Submission Tags: phishing malicious Search All
Submission: On May 23 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 7th 2020. Valid for: 3 months.
This is the only time mexicoazul.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 112.78.2.99 112.78.2.99 | 45538 (ODS-AS-VN...) (ODS-AS-VN Online data services) | |
1 | 192.229.133.41 192.229.133.41 | 15133 (EDGECAST) (EDGECAST) | |
7 | 162.241.60.239 162.241.60.239 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
2 | 2a00:1450:400... 2a00:1450:4001:814::200a | 15169 (GOOGLE) (GOOGLE) | |
11 | 4 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 162-241-60-239.unifiedlayer.com
mexicoazul.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
mexicoazul.org
mexicoazul.org |
21 KB |
2 |
googleapis.com
fonts.googleapis.com |
1 KB |
1 |
bac-assets.com
www.bac-assets.com |
|
1 |
atonny.com
atonny.com |
750 B |
11 | 4 |
Domain | Requested by | |
---|---|---|
7 | mexicoazul.org |
atonny.com
mexicoazul.org |
2 | fonts.googleapis.com |
mexicoazul.org
|
1 | www.bac-assets.com |
atonny.com
|
1 | atonny.com | |
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
atonny.com Let's Encrypt Authority X3 |
2020-05-22 - 2020-08-20 |
3 months | crt.sh |
www.bac-assets.com Entrust Certification Authority - L1M |
2020-01-09 - 2021-01-09 |
a year | crt.sh |
mexicoazul.org Let's Encrypt Authority X3 |
2020-05-07 - 2020-08-05 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-05-05 - 2020-07-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mexicoazul.org/PayPal/?country.x=CH&locale.x=en_CH%3E&client=da6e8bd46e3e9755b760ae5ff25c1d40
Frame ID: FD21CB8F677D0732B4635B2500F813B9
Requests: 11 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://atonny.com/redirect.php Page URL
- https://mexicoazul.org/PayPal/ Page URL
- https://mexicoazul.org/PayPal/?country.x=CH&locale.x=en_CH%3E&client=da6e8bd46e3e9755b760ae5ff25c1d40 Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://atonny.com/redirect.php Page URL
- https://mexicoazul.org/PayPal/ Page URL
- https://mexicoazul.org/PayPal/?country.x=CH&locale.x=en_CH%3E&client=da6e8bd46e3e9755b760ae5ff25c1d40 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
redirect.php
atonny.com/ |
870 B 750 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
assets-images-site-hp-assets-mastheads-online-banking-OLB_Masthead_ARNVGB4K_1440.webp
www.bac-assets.com/hp-assets/spa-assets/images/ |
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
mexicoazul.org/PayPal/ |
126 B 330 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
mexicoazul.org/PayPal/ |
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
master.css
mexicoazul.org/PayPal/assets/css/ |
32 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
master.js
mexicoazul.org/PayPal/assets/js/ |
3 KB 847 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b64.min.js
mexicoazul.org/PayPal/assets/js/ |
2 KB 652 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 670 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
3 KB 661 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
mexicoazul.org/PayPal/assets/img/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
notif.png
mexicoazul.org/PayPal/assets/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| logine object| Base64 number| c2 number| c10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
atonny.com
fonts.googleapis.com
mexicoazul.org
www.bac-assets.com
112.78.2.99
162.241.60.239
192.229.133.41
2a00:1450:4001:814::200a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