paypal.signin-dashboard.com
Open in
urlscan Pro
192.198.95.133
Malicious Activity!
Public Scan
Submission: On October 27 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on October 27th 2020. Valid for: 3 months.
This is the only time paypal.signin-dashboard.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 192.198.95.133 192.198.95.133 | 31863 (DACEN-2) (DACEN-2) | |
1 | 2a00:1450:400... 2a00:1450:4001:801::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 77.55.235.217 77.55.235.217 | 15967 (NAZWA) (NAZWA) | |
2 | 54.204.118.255 54.204.118.255 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 3.90.94.177 3.90.94.177 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 52.90.41.11 52.90.41.11 | 14618 (AMAZON-AES) (AMAZON-AES) | |
11 | 7 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-204-118-255.compute-1.amazonaws.com
trigger-realtime-lincoln.herokuapp.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-90-94-177.compute-1.amazonaws.com
beta.lincoln--project.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-90-41-11.compute-1.amazonaws.com
stats.pusher.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
signin-dashboard.com
paypal.signin-dashboard.com |
1 MB |
2 |
herokuapp.com
trigger-realtime-lincoln.herokuapp.com |
1 KB |
1 |
pusher.com
stats.pusher.com |
228 B |
1 |
lincoln--project.com
beta.lincoln--project.com |
1 KB |
1 |
ip2c.org
ip2c.org |
224 B |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
7 KB |
1 |
googleapis.com
fonts.googleapis.com |
771 B |
11 | 7 |
Domain | Requested by | |
---|---|---|
4 | paypal.signin-dashboard.com |
paypal.signin-dashboard.com
|
2 | trigger-realtime-lincoln.herokuapp.com |
paypal.signin-dashboard.com
|
1 | stats.pusher.com |
paypal.signin-dashboard.com
|
1 | beta.lincoln--project.com |
paypal.signin-dashboard.com
|
1 | ip2c.org |
paypal.signin-dashboard.com
|
1 | stackpath.bootstrapcdn.com |
paypal.signin-dashboard.com
|
1 | fonts.googleapis.com |
paypal.signin-dashboard.com
|
11 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
paypal.signin-dashboard.com Let's Encrypt Authority X3 |
2020-10-27 - 2021-01-25 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-10-06 - 2020-12-29 |
3 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
ip2c.org Let's Encrypt Authority X3 |
2020-10-10 - 2021-01-08 |
3 months | crt.sh |
*.herokuapp.com DigiCert SHA2 High Assurance Server CA |
2020-06-15 - 2021-07-07 |
a year | crt.sh |
beta.lincoln--project.com Let's Encrypt Authority X3 |
2020-10-04 - 2021-01-02 |
3 months | crt.sh |
*.pusher.com Gandi Standard SSL CA 2 |
2020-01-09 - 2021-04-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://paypal.signin-dashboard.com/
Frame ID: 4518CB6D4C4076DCCB199160256CA23C
Requests: 10 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
paypal.signin-dashboard.com/ |
659 B 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
6 KB 771 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
paypal.signin-dashboard.com/css/ |
18 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.js
paypal.signin-dashboard.com/js/ |
1 MB 1 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s
ip2c.org/ |
23 B 224 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H/1.1 |
tracking
trigger-realtime-lincoln.herokuapp.com/paypal/trigger/ |
0 0 |
Other
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PATCH H/1.1 |
tracking
trigger-realtime-lincoln.herokuapp.com/paypal/trigger/ |
15 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
PATCH H/1.1 |
tracking
paypal.signin-dashboard.com/ |
2 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
paypal
beta.lincoln--project.com/service/ |
2 B 1 KB |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1
stats.pusher.com/timeline/v2/jsonp/ |
80 B 228 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes object| webpackJsonp object| regeneratorRuntime function| setImmediate function| clearImmediate function| Pusher2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
paypal.signin-dashboard.com/ | Name: lincoln_paypal_scampage_session Value: eyJpdiI6IjIwVm5URXhmR25SMEh3N2NZa203S3c9PSIsInZhbHVlIjoiTzJ2Z2YyVVg1NWxxREg4ampLYmE2aDUzMUVzZnM2YVZVclh6ZmZ0YUNOQkxyZk43TmF2MGtOMnpUbytnNm9iZVFTNnJpa3k4U0ZQYVlYWXp4S1ZscmtkaXZWMFgzdjRFQ09CeE8xc3piTTFRYkV6UXg4cDJGc2VienhyK3R6eTYiLCJtYWMiOiJkMjFjNjY1N2YyMGM2ZTJiZGQzYTIxOGZhZmJhNWJjNGZkYTcyODA2MWM5YjA5YTU2ZTI2ZDczMjYzNDZkMDI5In0%3D |
|
paypal.signin-dashboard.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Im9VajFZY2RmN0pLL3d0WHFnYVFHbUE9PSIsInZhbHVlIjoiREFKZEpod0JtU05QRFh1Wm9SdHozQSt4UnF2ZDFySlZzNnFVTTduQnFlMmRjQWlkdXV2anB2NTZMeEMyU0t5UTQ0ZlpwWEdFVnlsb3RhenNidkZQVFlaSUFDWnhMbXNiVkgvOXBPOXMrZ0tleDhJWHliZU9sYXQybkl3NjRuKzUiLCJtYWMiOiIwNzMxNDM2MGNjNTQ4OTk4YjQ0NmE5OWY4NjM1MTZjNDdmMjlmZGU3MDk3ZmI3YWM1YTNmMDNhOWM0OTA5ZTQ2In0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
beta.lincoln--project.com
fonts.googleapis.com
ip2c.org
paypal.signin-dashboard.com
stackpath.bootstrapcdn.com
stats.pusher.com
trigger-realtime-lincoln.herokuapp.com
192.198.95.133
2001:4de0:ac19::1:b:2a
2a00:1450:4001:801::200a
3.90.94.177
52.90.41.11
54.204.118.255
77.55.235.217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