information-case.accounts-problem.cf Open in urlscan Pro
142.4.0.144  Malicious Activity! Public Scan

URL: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_log...
Submission: On July 09 via automatic, source phishtank

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 6 HTTP transactions. The main IP is 142.4.0.144, located in Provo, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is information-case.accounts-problem.cf.
This is the only time information-case.accounts-problem.cf was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online)

Domain & IP information

IP Address AS Autonomous System
4 142.4.0.144 46606 (UNIFIEDLA...)
2 92.123.92.235 20940 (AKAMAI-ASN1)
6 2
Domain Requested by
4 information-case.accounts-problem.cf information-case.accounts-problem.cf
2 www.paypalobjects.com information-case.accounts-problem.cf
6 2

This site contains no links.

Subject Issuer Validity Valid
www.paypalobjects.com
Symantec Class 3 EV SSL CA - G3
2015-10-12 -
2017-09-02
2 years crt.sh

This page contains 1 frames:

Primary Page: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Frame ID: 12842.1
Requests: 6 HTTP requests in this frame

Screenshot


Page Statistics

6
Requests

33 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

40 kB
Transfer

73 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/
7 KB
7 KB
Document
General
Full URL
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Protocol
HTTP/1.1
Server
142.4.0.144 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-0-144.unifiedlayer.com
Software
Apache /
Resource Hash
54b34e6ab1322ca6a554dddfbeb5a3396d6f82947049d0bb87f02b54d8b69a3c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Pragma
no-cache
Date
Sun, 09 Jul 2017 16:05:58 GMT
Server
Apache
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Cache-Control
no-store, no-cache, must-revalidate
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Expires
Thu, 19 Nov 1981 08:52:00 GMT
hok.js
information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/
20 KB
20 KB
Script
General
Full URL
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/hok.js
Requested by
Host: information-case.accounts-problem.cf
URL: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Protocol
HTTP/1.1
Server
142.4.0.144 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-0-144.unifiedlayer.com
Software
Apache /
Resource Hash
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8

Request headers

Referer
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sun, 09 Jul 2017 16:05:59 GMT
Last-Modified
Sat, 08 Jul 2017 13:27:49 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
20325
app.css
www.paypalobjects.com/web/res/dd1/3776a01d8c6d0e1d251f0de8e5e55/css/
41 KB
8 KB
Stylesheet
General
Full URL
https://www.paypalobjects.com/web/res/dd1/3776a01d8c6d0e1d251f0de8e5e55/css/app.css
Requested by
Host: information-case.accounts-problem.cf
URL: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
92.123.92.235 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a92-123-92-235.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
2f55d1691615c70e7f2bd076b025b17de86275a13f5e47d1aba3bbc80e4f2672

Request headers

Referer
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

date
Sun, 09 Jul 2017 16:06:00 GMT
content-encoding
gzip
last-modified
Fri, 01 Jul 2016 03:12:01 GMT
server
Apache
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=7776000
accept-ranges
bytes
content-length
8118
expires
Sat, 07 Oct 2017 16:06:00 GMT
main.css
information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/css/
0
0
Stylesheet
General
Full URL
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/css/main.css
Requested by
Host: information-case.accounts-problem.cf
URL: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Protocol
HTTP/1.1
Server
142.4.0.144 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-0-144.unifiedlayer.com
Software
Apache /
Resource Hash

Request headers

Referer
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sun, 09 Jul 2017 16:06:00 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=98
Content-Length
428
Content-Type
text/html; charset=iso-8859-1
modernizr.js
information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/js/vendor/
0
0
Script
General
Full URL
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/js/vendor/modernizr.js
Requested by
Host: information-case.accounts-problem.cf
URL: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Protocol
HTTP/1.1
Server
142.4.0.144 Provo, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
142-4-0-144.unifiedlayer.com
Software
Apache /
Resource Hash

Request headers

Referer
http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Sun, 09 Jul 2017 16:06:00 GMT
Server
Apache
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
438
Content-Type
text/html; charset=iso-8859-1
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: information-case.accounts-problem.cf
URL: http://information-case.accounts-problem.cf/f0e02fd6824ff2bbb8a5be11286f8294ZjAwMGNkMzIxYzQ3NWQwNzNlMWIxZjZjYWE2ZWE4NzA=/myaccount/websc_login/?country.x=US&locale.x=en_US
Protocol
SPDY
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
92.123.92.235 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a92-123-92-235.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
https://www.paypalobjects.com/web/res/dd1/3776a01d8c6d0e1d251f0de8e5e55/css/app.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

date
Sun, 09 Jul 2017 16:06:00 GMT
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
accept-ranges
bytes
content-length
4945
expires
Tue, 08 Aug 2017 16:06:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
information-case.accounts-problem.cf/ Name: PHPSESSID
Value: 47e0f2d5388f16f1bffba4823bcfe4ba