megatec.es
Open in
urlscan Pro
62.210.108.5
Malicious Activity!
Public Scan
Submission: On November 14 via automatic, source phishtank
Summary
This is the only time megatec.es was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
17 | 62.210.108.5 62.210.108.5 | 12876 (AS12876) (AS12876) | |
4 | 2.18.232.222 2.18.232.222 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
22 | 3 |
ASN12876 (AS12876, FR)
PTR: 62-210-108-5.rev.poneytelecom.eu
megatec.es |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a2-18-232-222.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
megatec.es
megatec.es |
301 KB |
4 |
paypalobjects.com
www.paypalobjects.com |
64 KB |
0 |
xoxxxoooxo.ml
Failed
xoxxxoooxo.ml Failed |
|
22 | 3 |
Domain | Requested by | |
---|---|---|
17 | megatec.es |
megatec.es
|
4 | www.paypalobjects.com |
megatec.es
|
0 | xoxxxoooxo.ml Failed |
megatec.es
|
22 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://megatec.es/account/Access/gMkz4/verify.php
Frame ID: 73410AA4EA563D0A63573C9554641936
Requests: 23 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
verify.php
megatec.es/account/Access/gMkz4/ |
33 KB 26 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
crypt.js
megatec.es/account/Access/assets/js/ |
20 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
megatec.es/account/Access/assets/css/ |
147 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
megatec.es/account/Access/assets/css/ |
28 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
VerifyPage.css
megatec.es/account/Access/assets/css/ |
23 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
megatec.es/account/Access/assets/js/ |
95 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
megatec.es/account/Access/assets/js/ |
46 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CardType.js
megatec.es/account/Access/assets/js/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
profilepic.png
megatec.es/account/Access/assets/img/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
warning-alert.jpg
megatec.es/account/Access/assets/img/ |
2 KB 2 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
paypal-security.png
megatec.es/account/Access/assets/img// |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
paypal-fast.png
megatec.es/account/Access/assets/img// |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cardreader-new.png
megatec.es/account/Access/assets/img// |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
paypal-donation.png
megatec.es/account/Access/assets/img/ |
11 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
sprite_logos_wallet_2x.png
www.paypalobjects.com/webstatic/sprite/ |
24 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
nav_step.png
www.paypalobjects.com/web/res/205/785babd2456d8a578524c2a7b1a2e/img/ |
288 B 617 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
nav_step_current.png
www.paypalobjects.com/web/res/205/785babd2456d8a578524c2a7b1a2e/img/ |
230 B 558 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headersResponse headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
PayPalSansBig-Light.woff2
www.paypalobjects.com/ui-web/paypal-sans-big/1-0-0/ |
37 KB 38 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
megatec.es/account/Access/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
_1_
xoxxxoooxo.ml/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff
megatec.es/account/Access/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.ttf
megatec.es/account/Access/assets/fonts/ |
149 KB 149 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- xoxxxoooxo.ml
- URL
- http://xoxxxoooxo.ml/_1_
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| Aes object| Base64 object| Utf8 string| V2 string| Viper string| output string| ctrTxt function| $ function| jQuery object| jQuery11220247280908259885020 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
megatec.es
www.paypalobjects.com
xoxxxoooxo.ml
xoxxxoooxo.ml
2.18.232.222
62.210.108.5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