thegrandcelebration.in Open in urlscan Pro
108.167.146.94  Malicious Activity! Public Scan

URL: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080...
Submission: On January 19 via automatic, source openphish

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 6 HTTP transactions. The main IP is 108.167.146.94, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1 - Unified Layer, US. The main domain is thegrandcelebration.in.
TLS certificate: Issued by Let's Encrypt Authority X3 on December 10th 2018. Valid for: 3 months.
This is the only time thegrandcelebration.in was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic (Online) PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
6 108.167.146.94 46606 (UNIFIEDLA...)
6 1
Apex Domain
Subdomains
Transfer
6 thegrandcelebration.in
thegrandcelebration.in
56 KB
6 1
Domain Requested by
6 thegrandcelebration.in thegrandcelebration.in
6 1

This site contains no links.

Subject Issuer Validity Valid
thegrandcelebration.in
Let's Encrypt Authority X3
2018-12-10 -
2019-03-10
3 months crt.sh

This page contains 1 frames:

Primary Page: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Frame ID: AAA841F73DD7C646F98342A982234F84
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • env /^jQuery$/i

Page Statistics

6
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

56 kB
Transfer

138 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_l...
7 KB
6 KB
Document
General
Full URL
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
108.167.146.94 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
42ad382749ee9b8ea6c9c75d2d2be7b283e48d3d757f0bd68978dff07d0bbbb0

Request headers

:method
GET
:authority
thegrandcelebration.in
:scheme
https
:path
/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
server
nginx/1.14.1
date
Sat, 19 Jan 2019 04:05:16 GMT
content-type
text/html; charset=UTF-8
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma
no-cache
set-cookie
PHPSESSID=af0306e9d5e9616832e89cf0c7529e9e; path=/
content-encoding
gzip
hok.js
thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_l...
20 KB
7 KB
Script
General
Full URL
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/hok.js
Requested by
Host: thegrandcelebration.in
URL: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
108.167.146.94 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
847c86ae982abe9180233276125b930b4a1b6f1bd12649b0c07535c1e984def8

Request headers

:path
/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/hok.js
pragma
no-cache
cookie
PHPSESSID=af0306e9d5e9616832e89cf0c7529e9e
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
thegrandcelebration.in
referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
:scheme
https
:method
GET
Referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Sat, 19 Jan 2019 04:05:17 GMT
content-encoding
gzip
last-modified
Sat, 19 Jan 2019 02:28:27 GMT
server
nginx/1.14.1
content-type
application/javascript
sign_in.css
thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/css/
24 KB
7 KB
Stylesheet
General
Full URL
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/css/sign_in.css
Requested by
Host: thegrandcelebration.in
URL: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
108.167.146.94 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
3290055cafa251475adbc5c824826b7848e8ed89133d3dbc73c63a0a841a1ac0

Request headers

:path
/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/css/sign_in.css
pragma
no-cache
cookie
PHPSESSID=af0306e9d5e9616832e89cf0c7529e9e
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
thegrandcelebration.in
referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
:scheme
https
:method
GET
Referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Sat, 19 Jan 2019 04:05:17 GMT
content-encoding
gzip
last-modified
Sat, 19 Jan 2019 02:28:27 GMT
server
nginx/1.14.1
content-type
text/css
jqury.js
thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/js/
84 KB
34 KB
Script
General
Full URL
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/js/jqury.js
Requested by
Host: thegrandcelebration.in
URL: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
108.167.146.94 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
2a1f1370eb7b24a307312112427dfd544fb838a8bef66babc936f5e870a22e52

Request headers

:path
/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/js/jqury.js
pragma
no-cache
cookie
PHPSESSID=af0306e9d5e9616832e89cf0c7529e9e
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
thegrandcelebration.in
referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
:scheme
https
:method
GET
Referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Sat, 19 Jan 2019 04:05:17 GMT
content-encoding
gzip
last-modified
Sat, 19 Jan 2019 02:28:27 GMT
server
nginx/1.14.1
content-type
application/javascript
login.js
thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/js/
910 B
497 B
Script
General
Full URL
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/js/login.js
Requested by
Host: thegrandcelebration.in
URL: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
108.167.146.94 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
92dd48f0faf17873c9b9f3ae2a1000d819225627ee4f1475ca54bd496f82dbdb

Request headers

:path
/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/js/login.js
pragma
no-cache
cookie
PHPSESSID=af0306e9d5e9616832e89cf0c7529e9e
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
thegrandcelebration.in
referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
:scheme
https
:method
GET
Referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Sat, 19 Jan 2019 04:05:17 GMT
content-encoding
gzip
last-modified
Sat, 19 Jan 2019 02:28:27 GMT
server
nginx/1.14.1
content-type
application/javascript
logins.PNG
thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/img/
2 KB
2 KB
Image
General
Full URL
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/img/logins.PNG
Requested by
Host: thegrandcelebration.in
URL: https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/websc_login/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
108.167.146.94 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US),
Reverse DNS
Software
nginx/1.14.1 /
Resource Hash
49bb344cab7bb90d18d29713e6bdf6196160d55fb775f8e27ddf28fac3ce60ed

Request headers

:path
/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/img/logins.PNG
pragma
no-cache
cookie
PHPSESSID=af0306e9d5e9616832e89cf0c7529e9e
accept-encoding
gzip, deflate, br
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
thegrandcelebration.in
referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/css/sign_in.css
:scheme
https
:method
GET
Referer
https://thegrandcelebration.in/images/PayPaI.com/Confirm-Your-PayPaI-Account-Information-Now/Suspended-Account/300e5c4dffc2e080dcc20d9ec329b4feOGIxMzhhYzU1MWU1MWE2MTRjYjEzM2U1MDg1ZGNlZDQ=/myaccount/css/sign_in.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Sat, 19 Jan 2019 04:05:18 GMT
last-modified
Sat, 19 Jan 2019 02:28:27 GMT
server
nginx/1.14.1
accept-ranges
bytes
content-length
1958
content-type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic (Online) PayPal (Financial)

15 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt function| $ function| jQuery function| disableselect function| reEnable function| clickIE

1 Cookies

Domain/Path Name / Value
thegrandcelebration.in/ Name: PHPSESSID
Value: af0306e9d5e9616832e89cf0c7529e9e