iufhchx.tk Open in urlscan Pro
2606:4700:3032::ac43:ba65  Malicious Activity! Public Scan

URL: http://iufhchx.tk/pay/error
Submission Tags: phishing malicious Search All
Submission: On August 16 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 2606:4700:3032::ac43:ba65, located in United States and belongs to CLOUDFLARENET, US. The main domain is iufhchx.tk.
This is the only time iufhchx.tk was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 151.101.14.133 54113 (FASTLY)
2 2
Apex Domain
Subdomains
Transfer
1 paypalobjects.com
www.paypalobjects.com
23 KB
1 iufhchx.tk
iufhchx.tk
2 KB
2 2
Domain Requested by
1 www.paypalobjects.com iufhchx.tk
1 iufhchx.tk
2 2

This site contains links to these domains. Also see Links.

Domain
www.paypal.com
Subject Issuer Validity Valid
www.paypalobjects.com
DigiCert SHA2 Extended Validation Server CA
2021-04-29 -
2021-12-13
8 months crt.sh

This page contains 1 frames:

Primary Page: http://iufhchx.tk/pay/error
Frame ID: 31F95F3A99EEC03A19848FFD27CBEFCE
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Page Statistics

2
Requests

50 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

25 kB
Transfer

29 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request error
iufhchx.tk/pay/
6 KB
2 KB
Document
General
Full URL
http://iufhchx.tk/pay/error
Protocol
HTTP/1.1
Server
2606:4700:3032::ac43:ba65 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
9172d2932858d0b0158c2fe54d83fc96e9877bfedfd747a11ea54c38654b2e10
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Host
iufhchx.tk
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Mon, 16 Aug 2021 07:35:02 GMT
Content-Type
text/html;charset=utf8
Transfer-Encoding
chunked
Connection
keep-alive
cf-cache-status
DYNAMIC
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=nX%2BlzPvHt8fjYjXnaYqEAGfunDLQfLJLywR5iJPWfuOph6clhS2weK3iqRmL0sAQUifsZKWkoS%2FfzcVuHA3G3F9A%2FaRgO%2FjyAfNC5fZI8SPHpq7b28M%2FRnUzlJ5BPQdLgXaVzHRM"}],"group":"cf-nel","max_age":604800}
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
strict-transport-security
max-age=31536000
Server
cloudflare
CF-RAY
67f8fbcd2e1b97f0-FRA
Content-Encoding
gzip
hermes_window_sprite_v16.png
www.paypalobjects.com/images/checkout/hermes/
23 KB
23 KB
Image
General
Full URL
https://www.paypalobjects.com/images/checkout/hermes/hermes_window_sprite_v16.png
Requested by
Host: iufhchx.tk
URL: http://iufhchx.tk/pay/error
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.14.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash
e8867e9b228e90c2c64825bf2bacaea7f283fce1176ccf849f0935a94da488dc
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Referer
http://iufhchx.tk/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Mon, 16 Aug 2021 07:35:02 GMT
via
1.1 varnish, 1.1 varnish
x-content-type-options
nosniff
x-cache
HIT, HIT
fastly-io-info
ifsz=23268 idim=250x350 ifmt=png ofsz=23268 odim=250x350 ofmt=png
paypal-debug-id
150d90a7c88f1
fastly-stats
io=1
dc
ccg11-origin-www-1.paypal.com
content-length
23268
fastly-io-warning
Failed to shrink image
x-served-by
cache-sjc10038-SJC, cache-fra19156-FRA
x-timer
S1629099302.433571,VS0,VE0
etag
"nnzRlS9MBgJaF5KTitXTyIJxOe9T0imDmyJbBzcjo2U"
strict-transport-security
max-age=31557600
content-type
image/png
cache-control
public,max-age=3600
accept-ranges
bytes
x-cache-hits
1652, 3

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

iufhchx.tk
www.paypalobjects.com
151.101.14.133
2606:4700:3032::ac43:ba65
9172d2932858d0b0158c2fe54d83fc96e9877bfedfd747a11ea54c38654b2e10
e8867e9b228e90c2c64825bf2bacaea7f283fce1176ccf849f0935a94da488dc