fraud-payment.com Open in urlscan Pro
95.216.26.237  Malicious Activity! Public Scan

Submitted URL: http://fraud-payment.com/h
Effective URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Submission: On June 11 via automatic, source twitter_illegalFawn

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 9 HTTP transactions. The main IP is 95.216.26.237, located in Ukraine and belongs to HETZNER-AS, DE. The main domain is fraud-payment.com.
This is the only time fraud-payment.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
3 10 95.216.26.237 24940 (HETZNER-AS)
2 216.58.206.1 15169 (GOOGLE)
9 2
Apex Domain
Subdomains
Transfer
10 fraud-payment.com
fraud-payment.com
134 KB
2 blogspot.com
my-style-css.blogspot.com
10 KB
9 2
Domain Requested by
10 fraud-payment.com 3 redirects fraud-payment.com
2 my-style-css.blogspot.com fraud-payment.com
9 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Frame ID: 34F24D1B48F370E62FD3362D7F3AE69C
Requests: 9 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://fraud-payment.com/h HTTP 301
    http://fraud-payment.com/h/ HTTP 302
    http://fraud-payment.com/h/mngi5mdg=?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1 HTTP 301
    http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1 Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • env /^PAYPAL$/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

9
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

143 kB
Transfer

477 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://fraud-payment.com/h HTTP 301
    http://fraud-payment.com/h/ HTTP 302
    http://fraud-payment.com/h/mngi5mdg=?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1 HTTP 301
    http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
fraud-payment.com/h/mngi5mdg=/
Redirect Chain
  • http://fraud-payment.com/h
  • http://fraud-payment.com/h/
  • http://fraud-payment.com/h/mngi5mdg=?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
  • http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
4 KB
2 KB
Document
General
Full URL
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
c335054331f168c5e740cac9f062314d71df510cc8386ca8ac9f74282c72ed4c

Request headers

Host
fraud-payment.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
34F24D1B48F370E62FD3362D7F3AE69C

Response headers

Date
Mon, 11 Jun 2018 14:13:58 GMT
Server
Apache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1375
Keep-Alive
timeout=1, max=97
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Mon, 11 Jun 2018 14:13:58 GMT
Server
Apache
Location
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Content-Length
316
Keep-Alive
timeout=1, max=98
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
/
my-style-css.blogspot.com//
0
4 KB
Stylesheet
General
Full URL
https://my-style-css.blogspot.com//
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
SPDY
Server
216.58.206.1 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f1.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

expires
Mon, 11 Jun 2018 14:13:59 GMT
cache-control
private, max-age=0
last-modified
Sun, 03 Jun 2018 02:31:23 GMT
content-type
text/html; charset=UTF-8
style.css
fraud-payment.com/h/conf/assests/css/
68 KB
12 KB
Stylesheet
General
Full URL
http://fraud-payment.com/h/conf/assests/css/style.css
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
ed82be1eb0327849db7615154d561ebdda81a0a385b791ebaeefb9a151b53051

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fraud-payment.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Mon, 11 Jun 2018 14:13:59 GMT
Content-Encoding
gzip
Last-Modified
Sun, 03 Jun 2018 13:40:44 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=604800, public
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=96
Content-Length
12240
Expires
Mon, 18 Jun 2018 14:13:59 GMT
main-script.js
fraud-payment.com/h/conf/assests/js/
43 KB
12 KB
Script
General
Full URL
http://fraud-payment.com/h/conf/assests/js/main-script.js
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
f2bfaf95a4a54d888244f7e05060cb026a3cb0c156a9a64576ff760fd567615f

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fraud-payment.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Mon, 11 Jun 2018 14:13:59 GMT
Content-Encoding
gzip
Last-Modified
Fri, 02 Feb 2018 18:53:00 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800, public
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=100
Content-Length
11814
Expires
Mon, 18 Jun 2018 14:13:59 GMT
jquery.additional-methods.js
fraud-payment.com/h/conf/assests/js/
22 KB
6 KB
Script
General
Full URL
http://fraud-payment.com/h/conf/assests/js/jquery.additional-methods.js
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
72d04d4e4fec062d1c4ef989026f021267b61ffa1d0350855a7007e81f49bba6

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fraud-payment.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Mon, 11 Jun 2018 14:13:59 GMT
Content-Encoding
gzip
Last-Modified
Tue, 06 Feb 2018 01:55:00 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800, public
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=100
Content-Length
5586
Expires
Mon, 18 Jun 2018 14:13:59 GMT
jquery.js
fraud-payment.com/h/conf/assests/js/
286 KB
84 KB
Script
General
Full URL
http://fraud-payment.com/h/conf/assests/js/jquery.js
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
692d421d5c163409a5918e802f507abbaa6bec90baa454c5252977a5b3b7ff0d

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fraud-payment.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Mon, 11 Jun 2018 14:13:59 GMT
Content-Encoding
gzip
Last-Modified
Tue, 06 Feb 2018 01:55:00 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800, public
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=100
Expires
Mon, 18 Jun 2018 14:13:59 GMT
jquery.validate.min.js
fraud-payment.com/h/conf/assests/js/
49 KB
13 KB
Script
General
Full URL
http://fraud-payment.com/h/conf/assests/js/jquery.validate.min.js
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
ca1415a994b05655d3a8fb4bbae4e38cfe62cfb17ecc559d1915f60bf39deb92

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fraud-payment.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
*/*
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Mon, 11 Jun 2018 14:13:59 GMT
Content-Encoding
gzip
Last-Modified
Mon, 12 Feb 2018 21:23:00 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/javascript
Cache-Control
max-age=604800, public
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=100
Content-Length
13116
Expires
Mon, 18 Jun 2018 14:13:59 GMT
logo.svg
fraud-payment.com/h/conf/assests/img/
5 KB
5 KB
Image
General
Full URL
http://fraud-payment.com/h/conf/assests/img/logo.svg
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
HTTP/1.1
Server
95.216.26.237 , Ukraine, ASN24940 (HETZNER-AS, DE),
Reverse DNS
server78.hostblast.net
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
fraud-payment.com
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Connection
keep-alive
Cache-Control
no-cache
Referer
http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

Date
Mon, 11 Jun 2018 14:13:59 GMT
Last-Modified
Fri, 02 Feb 2018 16:47:00 GMT
Server
Apache
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=1, max=99
Content-Length
4945
/
my-style-css.blogspot.com/
0
5 KB
Image
General
Full URL
https://my-style-css.blogspot.com/
Requested by
Host: fraud-payment.com
URL: http://fraud-payment.com/h/mngi5mdg=/?country.x=&countryCode=&Token=abe81947ee31e398b72b5dccdd3431a1
Protocol
SPDY
Server
216.58.206.1 Mountain View, United States, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
fra16s20-in-f1.1e100.net
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://fraud-payment.com/h/conf/assests/css/style.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/66.0.3359.139 Safari/537.36

Response headers

expires
Mon, 11 Jun 2018 14:13:59 GMT
cache-control
private, max-age=0
last-modified
Sun, 03 Jun 2018 02:31:23 GMT
content-type
text/html; charset=UTF-8

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| PAYPAL function| $ function| jQuery

0 Cookies