tranactions.shop
Open in
urlscan Pro
2606:4700:3032::6815:2c59
Malicious Activity!
Public Scan
Submission: On April 14 via manual from CH
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on April 9th 2021. Valid for: a year.
This is the only time tranactions.shop was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic (Online) PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
12 | 2606:4700:303... 2606:4700:3032::6815:2c59 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
12 |
tranactions.shop
tranactions.shop |
586 KB |
12 | 1 |
Domain | Requested by | |
---|---|---|
12 | tranactions.shop |
tranactions.shop
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-04-09 - 2022-04-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://tranactions.shop/?secure=607465512bd7e
Frame ID: 83F24AABA31E97DF616FEAE1F79CA896
Requests: 12 HTTP requests in this frame
Screenshot
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
tranactions.shop/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.ltr.css
tranactions.shop/public/css/ |
225 KB 37 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
page.c9a650b6b85d7c2bdddc.css
tranactions.shop/public/css/ |
173 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contextualLogin.css
tranactions.shop/public/css/ |
106 KB 15 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
success-animation_2x.gif
tranactions.shop/public/img/ |
33 KB 33 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vx-lib.min.js
tranactions.shop/public/js/ |
9 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendor.js
tranactions.shop/public/js/ |
889 KB 231 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flowBundle.js
tranactions.shop/public/js/ |
875 KB 187 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
tranactions.shop/public/js/ |
41 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mylogo-logo-129x32.svg
tranactions.shop/public/img/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Light.woff2
tranactions.shop/public/fonts/ |
18 KB 18 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Regular.woff2
tranactions.shop/public/fonts/ |
18 KB 18 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic (Online) PayPal (Financial)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated object| VX object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| CW object| PAYPAL object| fpti string| fptiserverurl2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
tranactions.shop/ | Name: PHPSESSID Value: 5ria6o882icpdf5lj3l47trbp1 |
|
.tranactions.shop/ | Name: __cfduid Value: d83fc57ea8549fce52a70ff818f76d0731618397608 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
tranactions.shop
2606:4700:3032::6815:2c59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