support-account.authorizeddns.net
143.244.162.222  Malicious Activity!

Submitted URL: https://urlz.fr/fU5E
Effective URL: https://support-account.authorizeddns.net/auth/secure/app/signin.php
Tags: phishing malicious
Submission: On June 15 via api from US

Summary

This website contacted 2 IPs in 2 countries across 3 domains to perform 5 HTTP transactions. The main IP is 143.244.162.222, located in United States and belongs to DIGITALOCEAN-ASN, US. The main domain is support-account.authorizeddns.net.
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 15th 2021. Valid for: 3 months.
This is the only time support-account.authorizeddns.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
2 6 143.244.162.222 14061 (DIGITALOC...)
1 2a00:1450:400... 15169 (GOOGLE)
5 2
Domain Requested by
6 support-account.authorizeddns.net 2 redirects support-account.authorizeddns.net
1 beltornado2020.blogspot.com support-account.authorizeddns.net
1 urlz.fr 1 redirects
5 3

This site contains no links.

Subject Issuer Validity Valid
support-account.authorizeddns.net
cPanel, Inc. Certification Authority
2021-06-15 -
2021-09-13
3 months crt.sh
misc-sni.blogspot.com
GTS CA 1C3
2021-05-17 -
2021-08-09
3 months crt.sh

This page contains 1 frames:

Primary Page: https://support-account.authorizeddns.net/auth/secure/app/signin.php
Frame ID: 3ACF9EA2A56180226FBA567493513441
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://urlz.fr/fU5E HTTP 302
    https://support-account.authorizeddns.net/auth/ HTTP 302
    https://support-account.authorizeddns.net/auth/secure/index.php?id=Paypal&request-id=bec7c79d-ad78-43ec-9c71-d12e37990... HTTP 302
    https://support-account.authorizeddns.net/auth/secure/app/signin.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

5
Requests

100 %
HTTPS

67 %
IPv6

3
Domains

3
Subdomains

2
IPs

2
Countries

115 kB
Transfer

113 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://urlz.fr/fU5E HTTP 302
    https://support-account.authorizeddns.net/auth/ HTTP 302
    https://support-account.authorizeddns.net/auth/secure/index.php?id=Paypal&request-id=bec7c79d-ad78-43ec-9c71-d12e379905d20cDovL3d3dy5h&787778377vhefhhgfnvshnHBsZS5jb20vc2hvcHwxYW9zNGJjMKJHlkgiutgKHklgklu66GY4MTI3ZGZhMWKJHKLGHGDJHKJNvbS9zaG9wL2FjY291bnQvc2V0dXAvc3RhcnQ_c= HTTP 302
    https://support-account.authorizeddns.net/auth/secure/app/signin.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request signin.php
support-account.authorizeddns.net/auth/secure/app/
Redirect Chain
  • https://urlz.fr/fU5E
  • https://support-account.authorizeddns.net/auth/
  • https://support-account.authorizeddns.net/auth/secure/index.php?id=Paypal&request-id=bec7c79d-ad78-43ec-9c71-d12e379905d20cDovL3d3dy5h&787778377vhefhhgfnvshnHBsZS5jb20vc2hvcHwxYW9zNGJjMKJHlkgiutgKH...
  • https://support-account.authorizeddns.net/auth/secure/app/signin.php
8 KB
9 KB
Document
General
Full URL
https://support-account.authorizeddns.net/auth/secure/app/signin.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.244.162.222 , United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
ece2c28f2d5f7056b53ec1577b3133a3557e7e0196028a88cd80653e8b73d0a7

Request headers

Host
support-account.authorizeddns.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Cookie
PHPSESSID=d15c43c23e9521baa034f87813c257fc
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 15 Jun 2021 16:11:52 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Keep-Alive
timeout=5, max=98
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Tue, 15 Jun 2021 16:11:52 GMT
Server
Apache
Location
app/signin.php
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
login.css
support-account.authorizeddns.net/auth/secure/assets/css/
16 KB
16 KB
Stylesheet
General
Full URL
https://support-account.authorizeddns.net/auth/secure/assets/css/login.css
Requested by
Host: support-account.authorizeddns.net
URL: https://support-account.authorizeddns.net/auth/secure/app/signin.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.244.162.222 , United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
1663f95ea0126d1a415ee9ca499b8a137e542346004234a0c3df869b4b9b1a13

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
support-account.authorizeddns.net
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://support-account.authorizeddns.net/auth/secure/app/signin.php
Cookie
PHPSESSID=d15c43c23e9521baa034f87813c257fc
Connection
keep-alive
Referer
https://support-account.authorizeddns.net/auth/secure/app/signin.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 15 Jun 2021 16:11:53 GMT
Last-Modified
Sun, 26 Apr 2020 08:57:56 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
15932
jquery.min.js
support-account.authorizeddns.net/auth/secure/assets/js/
85 KB
85 KB
Script
General
Full URL
https://support-account.authorizeddns.net/auth/secure/assets/js/jquery.min.js
Requested by
Host: support-account.authorizeddns.net
URL: https://support-account.authorizeddns.net/auth/secure/app/signin.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.244.162.222 , United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
d3a518dea876de39f9e5dc1ffcdeb6c661aee25d8a62474386b664ef3bf1b40f

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
support-account.authorizeddns.net
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://support-account.authorizeddns.net/auth/secure/app/signin.php
Cookie
PHPSESSID=d15c43c23e9521baa034f87813c257fc
Connection
keep-alive
Referer
https://support-account.authorizeddns.net/auth/secure/app/signin.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 15 Jun 2021 16:11:53 GMT
Last-Modified
Tue, 29 Aug 2017 08:03:08 GMT
Server
Apache
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
86661
/
beltornado2020.blogspot.com/
0
0
Image
General
Full URL
https://beltornado2020.blogspot.com/
Requested by
Host: support-account.authorizeddns.net
URL: https://support-account.authorizeddns.net/auth/secure/assets/css/login.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::2001 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://support-account.authorizeddns.net/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

big.svg
support-account.authorizeddns.net/auth/secure/assets/img/
5 KB
5 KB
Image
General
Full URL
https://support-account.authorizeddns.net/auth/secure/assets/img/big.svg
Requested by
Host: support-account.authorizeddns.net
URL: https://support-account.authorizeddns.net/auth/secure/assets/css/login.css
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
143.244.162.222 , United States, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
support-account.authorizeddns.net
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://support-account.authorizeddns.net/auth/secure/assets/css/login.css
Connection
keep-alive
Referer
https://support-account.authorizeddns.net/auth/secure/assets/css/login.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Tue, 15 Jun 2021 16:11:53 GMT
Last-Modified
Sat, 21 Mar 2020 07:27:14 GMT
Server
Apache
Content-Type
image/svg+xml
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
4945

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| validatePayForm

0 Cookies