account0ppl-mdnnlaau66.live-website.com
Open in
urlscan Pro
74.208.236.121
Malicious Activity!
Public Scan
Effective URL: https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/4.php?join-us.x=b0d74058b0cd6f1b0996ec305a653473b0d74058b0cd6f1b0996ec305a653473
Submission: On January 30 via api from GB — Scanned from CH
Summary
TLS certificate: Issued by GeoTrust TLS RSA CA G1 on June 9th 2023. Valid for: a year.
This is the only time account0ppl-mdnnlaau66.live-website.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 35.240.139.66 35.240.139.66 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
1 1 | 18.184.197.212 18.184.197.212 | 16509 (AMAZON-02) (AMAZON-02) | |
4 13 | 74.208.236.121 74.208.236.121 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
2 | 151.101.66.133 151.101.66.133 | 54113 (FASTLY) (FASTLY) | |
11 | 2 |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 66.139.240.35.bc.googleusercontent.com
kernel.guru |
ASN16509 (AMAZON-02, US)
PTR: eu-ip-2.short.io
d7o7.short.gy |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
PTR: 74-208-236-121.elastic-ssl.ui-r.com
account0ppl-mdnnlaau66.live-website.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
live-website.com
4 redirects
account0ppl-mdnnlaau66.live-website.com |
183 KB |
2 |
paypalobjects.com
www.paypalobjects.com — Cisco Umbrella Rank: 2611 |
24 KB |
1 |
short.gy
1 redirects
d7o7.short.gy |
140 B |
1 |
kernel.guru
1 redirects
kernel.guru |
476 B |
11 | 4 |
Domain | Requested by | |
---|---|---|
13 | account0ppl-mdnnlaau66.live-website.com |
4 redirects
account0ppl-mdnnlaau66.live-website.com
|
2 | www.paypalobjects.com |
account0ppl-mdnnlaau66.live-website.com
|
1 | d7o7.short.gy | 1 redirects |
1 | kernel.guru | 1 redirects |
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.live-website.com GeoTrust TLS RSA CA G1 |
2023-06-09 - 2024-06-08 |
a year | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2024-01-24 - 2024-08-21 |
7 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/4.php?join-us.x=b0d74058b0cd6f1b0996ec305a653473b0d74058b0cd6f1b0996ec305a653473
Frame ID: CD1270BFE0C950B8D4EB8448398925CD
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
Melden Sie sich bei Ihrem PayPal-Konto anPage URL History Show full URLs
-
https://kernel.guru/m6BIo
HTTP 301
https://d7o7.short.gy/yE5Gc3 HTTP 302
https://account0ppl-mdnnlaau66.live-website.com/ch HTTP 301
https://account0ppl-mdnnlaau66.live-website.com/ch/ HTTP 302
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/index?id=chase&country=CH HTTP 302
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3 HTTP 301
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/ Page URL
- https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/4.php?join-us.x=b0d74058b0cd6f1b0996ec305a653473b0d74058b0cd6f1b... Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
PayPal (Payment Processors) Expand
Detected patterns
- paypalobjects\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://kernel.guru/m6BIo
HTTP 301
https://d7o7.short.gy/yE5Gc3 HTTP 302
https://account0ppl-mdnnlaau66.live-website.com/ch HTTP 301
https://account0ppl-mdnnlaau66.live-website.com/ch/ HTTP 302
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/index?id=chase&country=CH HTTP 302
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3 HTTP 301
https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/ Page URL
- https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/4.php?join-us.x=b0d74058b0cd6f1b0996ec305a653473b0d74058b0cd6f1b0996ec305a653473 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://kernel.guru/m6BIo HTTP 301
- https://d7o7.short.gy/yE5Gc3 HTTP 302
- https://account0ppl-mdnnlaau66.live-website.com/ch HTTP 301
- https://account0ppl-mdnnlaau66.live-website.com/ch/ HTTP 302
- https://account0ppl-mdnnlaau66.live-website.com/ch/secure/index?id=chase&country=CH HTTP 302
- https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3 HTTP 301
- https://account0ppl-mdnnlaau66.live-website.com/ch/secure/3/
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/ Redirect Chain
|
125 B 293 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
4.php
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.min.js
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/56ce037aad0253/ |
85 KB 35 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
stylogino.css
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/statics/ |
66 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flagcountry.css
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/statics/ |
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
plugins.js
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/0de0fb0f/ |
55 KB 18 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.js
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/0de0fb0f/ |
4 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pdf.png
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/statics/images/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_form_2x.png
www.paypalobjects.com/webstatic/i/consumer/onboarding/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all-flag.png
account0ppl-mdnnlaau66.live-website.com/ch/secure/3/statics/images/img/ |
108 KB 108 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Medium.woff2
www.paypalobjects.com/paypal-ui/fonts/ |
18 KB 19 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| _0xfc4d function| $ function| jQuery function| validateEmail1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
account0ppl-mdnnlaau66.live-website.com/ | Name: PHPSESSID Value: 84080686f97327a2231957764999023d |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
account0ppl-mdnnlaau66.live-website.com
d7o7.short.gy
kernel.guru
www.paypalobjects.com
151.101.66.133
18.184.197.212
35.240.139.66
74.208.236.121
0c3d1fc5d48c95215f191c2548c4001342589d175330f95f658dd664880aada9
21f89c7c27f0eab13388645aea1eedb4a342c06333a14d74c1a10dfca04d6455
2ae6779c6c3579643ab6deb5cfb822e843bf637d006a4ec25d9857ec7fb6d8c1
40018c15ae45f4265cdc58cb3703ecdada5a69990976d2e499ba9f09c5bfab6a
42e7b111308859983ca55376d0878f84ae8562a51c881856c236cff8eba244b9
656b81fc8ce755e7cdacde6bcb9e9c2af44902025e0c10cd1ac897ca3945dacb
71b7b6197c430cd00e8cf4d1a72ae8217a5047f1deffd80f2affa7cc21b2b08c
a9cb021d2bf22fd7b002d027be449f491ed1c34928a9d49abb9551cda88ee727
d662747018528e56e73f581f4ac187dffe16319c79d9822dae27b33ff69593e6
ef9d53838631fa6adaf861f047dc36844cf716ca0e25d6673d5fb8b22ecdd400
f31ae037a2f8a37f3c0bdaaeb7dd7d304fac74dac577c91dd1dab9af20fc598c