removepaym-attempt.com Open in urlscan Pro
34.159.64.91  Malicious Activity! Public Scan

Submitted URL: http://removepaym-attempt.com/
Effective URL: http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeX...
Submission: On January 16 via api from GB — Scanned from GB

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 9 HTTP transactions. The main IP is 34.159.64.91, located in Frankfurt am Main, Germany and belongs to GOOGLE-PRIVATE-CLOUD, US. The main domain is removepaym-attempt.com.
This is the only time removepaym-attempt.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Nationwide Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
9 34.159.64.91 396982 (GOOGLE-PR...)
9 1
Apex Domain
Subdomains
Transfer
9 removepaym-attempt.com
removepaym-attempt.com
520 KB
9 1
Domain Requested by
9 removepaym-attempt.com removepaym-attempt.com
9 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
Frame ID: E4444213968B98763CF346162DF33856
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

Internet Bank | Login | Nationwide

Page URL History Show full URLs

  1. http://removepaym-attempt.com/ Page URL
  2. http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWc... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Page Statistics

9
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

520 kB
Transfer

518 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://removepaym-attempt.com/ Page URL
  2. http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
removepaym-attempt.com/
244 B
625 B
Document
General
Full URL
http://removepaym-attempt.com/
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
ff9ce23b12ae545f2f9bd6b3e4dd4bf0ccaab644593a91a67c1eaab92e0d7f0e

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36
Accept-Language
en-GB,en;q=0.9

Response headers

Date
Sun, 16 Jan 2022 13:13:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Primary Request IdentfyCustmer.php
removepaym-attempt.com/
31 KB
31 KB
Document
General
Full URL
http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
0194a89a2e242abecccc57041b4e331194c465cc51dd8d2d3e9494ce38af4a3d

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36
Accept-Language
en-GB,en;q=0.9
Referer
http://removepaym-attempt.com/

Response headers

Date
Sun, 16 Jan 2022 13:13:20 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
leave.css
removepaym-attempt.com/game/
3 KB
4 KB
Stylesheet
General
Full URL
http://removepaym-attempt.com/game/leave.css
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
5bc380039fc8975a2019b3b595b21c56afb3e13faddcafc2f3911ca8c77e4199

Request headers

Accept-Language
en-GB,en;q=0.9
Referer
http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:20 GMT
Last-Modified
Sun, 29 Mar 2020 23:20:58 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
3383
online.css
removepaym-attempt.com/game/
182 KB
182 KB
Stylesheet
General
Full URL
http://removepaym-attempt.com/game/online.css
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
00de2e78908bda5fca421b84efc271ba888da480cb52f580f08f152274e39c42

Request headers

Accept-Language
en-GB,en;q=0.9
Referer
http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:20 GMT
Last-Modified
Thu, 09 Apr 2020 05:01:20 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=97
Content-Length
186130
FSCS_Logo.png
removepaym-attempt.com/game/
73 KB
73 KB
Image
General
Full URL
http://removepaym-attempt.com/game/FSCS_Logo.png
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
1179a312fd24a1546386f94b7c744562e65bd1ef8eea12d7d1f4f234289f3bad

Request headers

Accept-Language
en-GB,en;q=0.9
Referer
http://removepaym-attempt.com/IdentfyCustmer.php?/AccesManagement/IdentfyCustomer/2EEVYQED&inID=yOaiFPWSWccphdqoNNEfoaSqQbTZeXGuJMdPVROMXiuOvQztPWeHzBut
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:21 GMT
Last-Modified
Sun, 29 Mar 2020 23:20:58 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
74251
NW_160x45.png
removepaym-attempt.com/game/
2 KB
2 KB
Image
General
Full URL
http://removepaym-attempt.com/game/NW_160x45.png
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/game/online.css
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
892ef25d857dbb17c3310310338578e0e19772646435a540fdc717b47979b13b

Request headers

Accept-Language
en-GB,en;q=0.9
Referer
http://removepaym-attempt.com/game/online.css
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:21 GMT
Last-Modified
Sun, 29 Mar 2020 23:21:18 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
2226
nbs-medium-webfont-woff.woff
removepaym-attempt.com/game/
33 KB
34 KB
Font
General
Full URL
http://removepaym-attempt.com/game/nbs-medium-webfont-woff.woff
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/game/online.css
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
154f369084c28c7ceaf71531663e84382b0f3ac78fffa7f91c4543499b8ee41b

Request headers

Referer
http://removepaym-attempt.com/game/online.css
Origin
http://removepaym-attempt.com
Accept-Language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:21 GMT
Last-Modified
Sun, 29 Mar 2020 23:21:18 GMT
Server
Apache
Content-Type
font/woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=96
Content-Length
34084
nbs-icons-woff.woff
removepaym-attempt.com/game/
161 KB
161 KB
Font
General
Full URL
http://removepaym-attempt.com/game/nbs-icons-woff.woff
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/game/online.css
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
c01ee414cef757dfcd67619395a9d6dac513d6eb9fe9baa8d70402d13b2a4647

Request headers

Referer
http://removepaym-attempt.com/game/online.css
Origin
http://removepaym-attempt.com
Accept-Language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:21 GMT
Last-Modified
Sun, 29 Mar 2020 23:21:18 GMT
Server
Apache
Content-Type
font/woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
165096
nbs-bold-webfont-woff.woff
removepaym-attempt.com/game/
32 KB
33 KB
Font
General
Full URL
http://removepaym-attempt.com/game/nbs-bold-webfont-woff.woff
Requested by
Host: removepaym-attempt.com
URL: http://removepaym-attempt.com/game/online.css
Protocol
HTTP/1.1
Server
34.159.64.91 Frankfurt am Main, Germany, ASN396982 (GOOGLE-PRIVATE-CLOUD, US),
Reverse DNS
91.64.159.34.bc.googleusercontent.com
Software
Apache /
Resource Hash
5cfc1d72a6c4c817544222468ad1a2f27ed404481f529f223c05c1c52bb3ba2c

Request headers

Referer
http://removepaym-attempt.com/game/online.css
Origin
http://removepaym-attempt.com
Accept-Language
en-GB,en;q=0.9
User-Agent
Mozilla/5.0 (Linux; Android 11) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/86.0.4240.185 Mobile Safari/537.36

Response headers

Date
Sun, 16 Jan 2022 13:13:21 GMT
Last-Modified
Sun, 29 Mar 2020 23:21:18 GMT
Server
Apache
Content-Type
font/woff
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
33208

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Nationwide Bank (Banking)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onsecuritypolicyviolation object| onslotchange function| DXBkuBC function| vdGcOmJOUw function| CwAkpdRTVJpC function| BWanhjCuDSoz3

1 Cookies

Domain/Path Name / Value
removepaym-attempt.com/ Name: PHPSESSID
Value: e0d1da5991dde060587de1177defd5d8