URL: http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1...
Submission: On December 02 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 141.8.195.39, located in Moscow, Russian Federation and belongs to SPRINTHOST, RU. The main domain is a0256651.xsph.ru.
This is the only time a0256651.xsph.ru was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
5 141.8.195.39 35278 (SPRINTHOST)
5 1
Apex Domain
Subdomains
Transfer
5 xsph.ru
a0256651.xsph.ru
56 KB
5 1
Domain Requested by
5 a0256651.xsph.ru a0256651.xsph.ru
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Frame ID: BECBD8E97B8A5BC0B747A1D4C2CC4D86
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /openresty(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js/i
  • env /^jQuery$/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

56 kB
Transfer

175 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/
4 KB
2 KB
Document
General
Full URL
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Protocol
HTTP/1.1
Server
141.8.195.39 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
lik.from.sh
Software
openresty /
Resource Hash
d1392fa12aac3ca18b4affae5bafbaf45c40ea904d3852343e58244dadfd6290

Request headers

Host
a0256651.xsph.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Server
openresty
Date
Sun, 02 Dec 2018 15:59:36 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
Set-Cookie
PHPSESSID=kbp09qqqmprh58hjgsrsbsp401; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Content-Encoding
gzip
gs_login.css
a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/css/
73 KB
15 KB
Stylesheet
General
Full URL
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/css/gs_login.css
Requested by
Host: a0256651.xsph.ru
URL: http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Protocol
HTTP/1.1
Server
141.8.195.39 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
lik.from.sh
Software
openresty /
Resource Hash
80a154d4d2c0d0f52dd5e5f112c4bd4dd84a8330a06322a97024c511b4c311ff

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
a0256651.xsph.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Cookie
PHPSESSID=kbp09qqqmprh58hjgsrsbsp401
Connection
keep-alive
Cache-Control
no-cache
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 02 Dec 2018 15:59:36 GMT
Content-Encoding
gzip
Last-Modified
Sun, 02 Dec 2018 15:56:10 GMT
Server
openresty
ETag
W/"5c04009a-12284"
Vary
Accept-Encoding
Content-Type
text/css
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 09 Dec 2018 15:59:36 GMT
jquery.js
a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/js/
94 KB
36 KB
Script
General
Full URL
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/js/jquery.js
Requested by
Host: a0256651.xsph.ru
URL: http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Protocol
HTTP/1.1
Server
141.8.195.39 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
lik.from.sh
Software
openresty /
Resource Hash
161ddce728615bd31a9c34fbb1cd047a4fe165e30cb86f826d1c856a956016ca

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
a0256651.xsph.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Cookie
PHPSESSID=kbp09qqqmprh58hjgsrsbsp401
Connection
keep-alive
Cache-Control
no-cache
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 02 Dec 2018 15:59:36 GMT
Content-Encoding
gzip
Last-Modified
Sun, 02 Dec 2018 15:56:10 GMT
Server
openresty
ETag
W/"5c04009a-17651"
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 09 Dec 2018 15:59:36 GMT
login.js
a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/js/
696 B
1017 B
Script
General
Full URL
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/js/login.js
Requested by
Host: a0256651.xsph.ru
URL: http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Protocol
HTTP/1.1
Server
141.8.195.39 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
lik.from.sh
Software
openresty /
Resource Hash
e11af7d139a5662450db6a0c86ae436be08a7cf86ada8c7d038e9edb955f1ce4

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
a0256651.xsph.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
*/*
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Cookie
PHPSESSID=kbp09qqqmprh58hjgsrsbsp401
Connection
keep-alive
Cache-Control
no-cache
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 02 Dec 2018 15:59:36 GMT
Last-Modified
Sun, 02 Dec 2018 15:56:10 GMT
Server
openresty
ETag
"5c04009a-2b8"
Content-Type
application/x-javascript
Cache-Control
max-age=604800
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
696
Expires
Sun, 09 Dec 2018 15:59:36 GMT
paypal-logo-129x32.svg
a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/images/
5 KB
2 KB
Image
General
Full URL
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/images/paypal-logo-129x32.svg
Requested by
Host: a0256651.xsph.ru
URL: http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/?dispatch=tG9WEPKw3LCjQWjBno7YQM3NLj1eVfSpW2mBR67VSJeIGxk4Wr
Protocol
HTTP/1.1
Server
141.8.195.39 Moscow, Russian Federation, ASN35278 (SPRINTHOST, RU),
Reverse DNS
lik.from.sh
Software
openresty /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
a0256651.xsph.ru
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/css/gs_login.css
Cookie
PHPSESSID=kbp09qqqmprh58hjgsrsbsp401
Connection
keep-alive
Cache-Control
no-cache
Referer
http://a0256651.xsph.ru/paypalactivating/gs_gen/gs4875276af85b5dcbd0cbb8ab67ed6c17/css/gs_login.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Date
Sun, 02 Dec 2018 15:59:36 GMT
Content-Encoding
gzip
Last-Modified
Sun, 02 Dec 2018 15:56:10 GMT
Server
openresty
ETag
W/"5c04009a-1351"
Vary
Accept-Encoding
Content-Type
image/svg+xml
Cache-Control
max-age=604800
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Sun, 09 Dec 2018 15:59:36 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| $ function| jQuery function| IsEmail function| Nextgs function| change

1 Cookies

Domain/Path Name / Value
a0256651.xsph.ru/ Name: PHPSESSID
Value: kbp09qqqmprh58hjgsrsbsp401