Submitted URL: https://outopaypla.blogspot.com/
Effective URL: https://ntizuchi.com/Paypal/myaccount/signin/
Submission Tags: phishing malicious Search All
Submission: On October 29 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 192.185.52.247, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is ntizuchi.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on September 15th 2020. Valid for: 3 months.
This is the only time ntizuchi.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 2a00:1450:400... 15169 (GOOGLE)
4 192.185.52.247 46606 (UNIFIEDLA...)
5 2
Apex Domain
Subdomains
Transfer
4 ntizuchi.com
ntizuchi.com
49 KB
1 blogspot.com
outopaypla.blogspot.com
16 KB
5 2
Domain Requested by
4 ntizuchi.com outopaypla.blogspot.com
ntizuchi.com
1 outopaypla.blogspot.com
5 2

This site contains no links.

Subject Issuer Validity Valid
misc-sni.blogspot.com
GTS CA 1O1
2020-10-06 -
2020-12-29
3 months crt.sh
webdisk.ntizuchi.com
Let's Encrypt Authority X3
2020-09-15 -
2020-12-14
3 months crt.sh

This page contains 1 frames:

Primary Page: https://ntizuchi.com/Paypal/myaccount/signin/
Frame ID: 103EC7AB2F14252AF5A8A2451A26CF01
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://outopaypla.blogspot.com/ Page URL
  2. https://ntizuchi.com/Paypal/myaccount/signin/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.blogspot\.com/i

Overall confidence: 100%
Detected patterns
  • url /^https?:\/\/[^/]+\.blogspot\.com/i

Overall confidence: 100%
Detected patterns
  • headers server /GSE/i

Overall confidence: 100%
Detected patterns
  • headers server /GSE/i

Page Statistics

5
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

65 kB
Transfer

181 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://outopaypla.blogspot.com/ Page URL
  2. https://ntizuchi.com/Paypal/myaccount/signin/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
outopaypla.blogspot.com/
72 KB
16 KB
Document
General
Full URL
https://outopaypla.blogspot.com/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:808::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
GSE /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

:method
GET
:authority
outopaypla.blogspot.com
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
content-type
text/html; charset=UTF-8
expires
Thu, 29 Oct 2020 06:10:36 GMT
date
Thu, 29 Oct 2020 06:10:36 GMT
cache-control
private, max-age=0
last-modified
Thu, 29 Oct 2020 04:53:17 GMT
etag
W/"2a680316557eebd1cdee17ea176bf7f9b9e6dc34863bd66a0962c9c16d922cee"
content-encoding
gzip
x-content-type-options
nosniff
x-xss-protection
1; mode=block
content-length
15709
server
GSE
alt-svc
h3-Q050=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-T051=":443"; ma=2592000,h3-T050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
Primary Request /
ntizuchi.com/Paypal/myaccount/signin/
7 KB
3 KB
Document
General
Full URL
https://ntizuchi.com/Paypal/myaccount/signin/
Requested by
Host: outopaypla.blogspot.com
URL: https://outopaypla.blogspot.com/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.52.247 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
ceachile.cl
Software
nginx/1.19.0 /
Resource Hash
f69b8f5aa08c27a7fb2ffc436fe72650e900b0217b73dcc1d2fba6ea5c808aa5

Request headers

:method
GET
:authority
ntizuchi.com
:scheme
https
:path
/Paypal/myaccount/signin/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
cross-site
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
https://outopaypla.blogspot.com/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
https://outopaypla.blogspot.com/

Response headers

status
200
date
Thu, 29 Oct 2020 06:10:37 GMT
server
nginx/1.19.0
content-type
text/html; charset=UTF-8
content-length
2456
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate
pragma
no-cache
vary
Accept-Encoding
content-encoding
gzip
x-endurance-cache-level
2
x-server-cache
false
set-cookie
PHPSESSID=80472476cc5b01afbf68a01214777f43; path=/
L-Z118.css
ntizuchi.com/Paypal/lib/css/
13 KB
4 KB
Stylesheet
General
Full URL
https://ntizuchi.com/Paypal/lib/css/L-Z118.css
Requested by
Host: ntizuchi.com
URL: https://ntizuchi.com/Paypal/myaccount/signin/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.52.247 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
ceachile.cl
Software
nginx/1.19.0 /
Resource Hash
1bcda772b32139bbd18696ba5a08fc2da9731cecf88d6b904cb953107484f55f

Request headers

Referer
https://ntizuchi.com/Paypal/myaccount/signin/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 29 Oct 2020 06:10:38 GMT
content-encoding
gzip
last-modified
Tue, 22 Nov 2016 23:08:20 GMT
server
nginx/1.19.0
x-server-cache
false
vary
Accept-Encoding
x-endurance-cache-level
2
content-type
text/css
status
200
cache-control
max-age=2592000
accept-ranges
bytes
content-length
4102
expires
Sat, 28 Nov 2020 06:10:37 GMT
jquery.js
ntizuchi.com/Paypal/lib/js/
84 KB
37 KB
Script
General
Full URL
https://ntizuchi.com/Paypal/lib/js/jquery.js
Requested by
Host: ntizuchi.com
URL: https://ntizuchi.com/Paypal/myaccount/signin/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.52.247 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
ceachile.cl
Software
nginx/1.19.0 /
Resource Hash
2a1f1370eb7b24a307312112427dfd544fb838a8bef66babc936f5e870a22e52

Request headers

Referer
https://ntizuchi.com/Paypal/myaccount/signin/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 29 Oct 2020 06:10:38 GMT
content-encoding
gzip
last-modified
Sun, 04 Sep 2016 18:12:42 GMT
server
nginx/1.19.0
x-server-cache
false
vary
Accept-Encoding
x-endurance-cache-level
2
content-type
application/javascript
status
200
cache-control
max-age=21600
accept-ranges
bytes
expires
Thu, 29 Oct 2020 12:10:37 GMT
kl_h4aXX6987PO.svg
ntizuchi.com/Paypal/lib/img/
5 KB
5 KB
Image
General
Full URL
https://ntizuchi.com/Paypal/lib/img/kl_h4aXX6987PO.svg
Requested by
Host: ntizuchi.com
URL: https://ntizuchi.com/Paypal/lib/css/L-Z118.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.185.52.247 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
ceachile.cl
Software
nginx/1.19.0 /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
https://ntizuchi.com/Paypal/lib/css/L-Z118.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Thu, 29 Oct 2020 06:10:38 GMT
last-modified
Wed, 14 Sep 2016 00:20:10 GMT
server
nginx/1.19.0
x-server-cache
false
x-endurance-cache-level
2
content-type
image/svg+xml
status
200
cache-control
max-age=21600
accept-ranges
bytes
content-length
4945
expires
Thu, 29 Oct 2020 12:10:38 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery

1 Cookies

Domain/Path Name / Value
ntizuchi.com/ Name: PHPSESSID
Value: 80472476cc5b01afbf68a01214777f43

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block