timetravel.mementoweb.org
Open in
urlscan Pro
52.40.90.220
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On September 22 via api from US
Summary
This is the only time timetravel.mementoweb.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 52.40.90.220 52.40.90.220 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 104.111.228.123 104.111.228.123 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
2 | 151.101.1.35 151.101.1.35 | 54113 (FASTLY) (FASTLY) | |
1 2 | 64.4.245.84 64.4.245.84 | 17012 (PAYPAL) (PAYPAL) | |
1 | 104.108.34.200 104.108.34.200 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
21 | 5 |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-40-90-220.us-west-2.compute.amazonaws.com
timetravel.mementoweb.org |
ASN16625 (AKAMAI-AS, US)
PTR: a104-111-228-123.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-108-34-200.deploy.static.akamaitechnologies.com
t.paypal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
paypalobjects.com
www.paypalobjects.com |
83 KB |
8 |
mementoweb.org
timetravel.mementoweb.org |
13 KB |
5 |
paypal.com
1 redirects
c.paypal.com b.stats.paypal.com dub.stats.paypal.com t.paypal.com |
22 KB |
21 | 3 |
Domain | Requested by | |
---|---|---|
9 | www.paypalobjects.com |
timetravel.mementoweb.org
www.paypalobjects.com |
8 | timetravel.mementoweb.org |
timetravel.mementoweb.org
www.paypalobjects.com |
2 | c.paypal.com |
www.paypalobjects.com
c.paypal.com |
1 | t.paypal.com | |
1 | dub.stats.paypal.com | |
1 | b.stats.paypal.com | 1 redirects |
21 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
c.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-06-24 - 2022-06-29 |
2 years | crt.sh |
b.stats.paypal.com DigiCert SHA2 High Assurance Server CA |
2020-03-13 - 2022-06-03 |
2 years | crt.sh |
t.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
This page contains 3 frames:
Primary Page:
http://timetravel.mementoweb.org/reconstruct/20141123205914mp_/https://www.paypal.com/signin?returnuri=https%3a/www.facebook.com
Frame ID: 9AF1E8CCA10943AD8DDD043CE01CD484
Requests: 19 HTTP requests in this frame
Frame:
https://c.paypal.com/v1/r/d/i?js_src=https://c.paypal.com/da/r/fb.js
Frame ID: E6093C3E2158AB7B10570E6056241324
Requests: 1 HTTP requests in this frame
Frame:
https://dub.stats.paypal.com/v1/counter2.cgi?r=cD0wOWQyM2FkYWUyYWI0ZTNhYWI1ODE3ZjhhMzgwNGI3ZCZpPTUyLjQwLjkwLjIyMCZ0PTE2MDA3NDU0MTIuMzc5JmE9MjEmcz1VTklGSUVEX0xPR0lOYoYeVIe2rI4qposRz13IxYsheBg
Frame ID: 91B2FB76AE87ECADA3EB7CFE0CC80EC1
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 16- https://b.stats.paypal.com/v1/counter.cgi?r=cD0wOWQyM2FkYWUyYWI0ZTNhYWI1ODE3ZjhhMzgwNGI3ZCZpPTUyLjQwLjkwLjIyMCZ0PTE2MDA3NDU0MTIuMzc5JmE9MjEmcz1VTklGSUVEX0xPR0lOYoYeVIe2rI4qposRz13IxYsheBg HTTP 302
- https://dub.stats.paypal.com/v1/counter2.cgi?r=cD0wOWQyM2FkYWUyYWI0ZTNhYWI1ODE3ZjhhMzgwNGI3ZCZpPTUyLjQwLjkwLjIyMCZ0PTE2MDA3NDU0MTIuMzc5JmE9MjEmcz1VTklGSUVEX0xPR0lOYoYeVIe2rI4qposRz13IxYsheBg
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
signin
timetravel.mementoweb.org/reconstruct/20141123205914mp_/https://www.paypal.com/ |
25 KB 9 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ngrlCaptcha.min.js
www.paypalobjects.com/webcaptcha/ |
21 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contextualLogin.css
www.paypalobjects.com/web/res/5f5/b4ec26b0ca824570d328ca6cdc49e/css/ |
98 KB 16 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-2.6.1.js
www.paypalobjects.com/web/res/5f5/b4ec26b0ca824570d328ca6cdc49e/js/lib/ |
4 KB 2 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-PN-check.png
www.paypalobjects.com/images/shared/ |
1 KB 1 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyph_alert_critical_big-2x.png
www.paypalobjects.com/images/shared/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fn-sync-telemetry-min.js
www.paypalobjects.com/web/res/5f5/b4ec26b0ca824570d328ca6cdc49e/js/lib/ |
5 KB 3 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin-split.js
www.paypalobjects.com/web/res/5f5/b4ec26b0ca824570d328ca6cdc49e/js/ |
130 KB 32 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
www.paypalobjects.com/pa/js/min/ |
46 KB 18 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
recaptchav3.js
timetravel.mementoweb.org/auth/createchallenge/a1a62d520c80e84c/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.js
c.paypal.com/da/r/ |
59 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
challenge.js
timetravel.mementoweb.org/auth/createchallenge/1a4e9b0c62149521/ |
571 B 726 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
client-log
timetravel.mementoweb.org/signin/ |
571 B 726 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cookie-banner
timetravel.mementoweb.org/signin/ |
571 B 726 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
timetravel.mementoweb.org/signin/ |
571 B 726 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
i
c.paypal.com/v1/r/d/ Frame E609 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
counter2.cgi
dub.stats.paypal.com/v1/ Frame 91B2 Redirect Chain
|
42 B 299 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ts
t.paypal.com/ |
42 B 780 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
timetravel.mementoweb.org/signin/ |
571 B 726 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
timetravel.mementoweb.org/signin/ |
571 B 726 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes boolean| paypalADSInterceptorInjected object| html5 object| Modernizr function| isEligibleIntegration object| antiClickjack object| PAYPAL function| $ object| fpti string| fptiserverurl object| _ifpti1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
timetravel.mementoweb.org/reconstruct/20141123205914mp_/https://www.paypal.com | Name: pywb.timestamp Value: 20200922033012 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
b.stats.paypal.com
c.paypal.com
dub.stats.paypal.com
t.paypal.com
timetravel.mementoweb.org
www.paypalobjects.com
104.108.34.200
104.111.228.123
151.101.1.35
52.40.90.220
64.4.245.84
04748dd9a27ac47177d01a763fd68b4ca09f5b9acb4208149f2de40251d07dd2
164dfb58c5165c2465d544a10f55e59c5625b753bca34b2a14e47f7421af08a8
4571d2505eb051a672a61d6e1fb9a0229f790499035ce10796227cef2a28dca5
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292
5396af5006928832517239a2145e9de4bfde558161bd68be9a4b57ea5f37acf5
655790946659ad22d9cf3a6a53adaaeebde362fe3cd46701069299d87ae804ef
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
743269eba97930520fffacfbab90f4468674fd06d329e45e6557d298fd16f2ed
8b202d5bd55968ce4bfc21c063166eaebe62104275ce7ec362d78b64b2581c95
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
a75a144e003852f84285466c1d970143c2c41146ba400ba8a78fb194f636a62c
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
b983de83ef078e5d567be19b5724c4e9666b4f1dd4ead74b291b88d920b2a21c
f1fcb9aeff61cc7415661e9927cea51664771fe031d4f52ef124ee55d64ad297