paypal.com-us-cgi-bin.webscr.cmd-login-submit.dispatch.5885d80a13c0db1f8e263663d3faee8d0b7e678ad883d0f93f8fd.quiindesign.com Open in urlscan Pro
103.27.62.62  Public Scan

Submitted URL: http://paypal.com-us-cgi-bin.webscr.cmd-login-submit.dispatch.5885d80a13c0db1f8e263663d3faee8d0b7e678ad883d0f93f8fd.quiindesign.com/
Effective URL: http://paypal.com-us-cgi-bin.webscr.cmd-login-submit.dispatch.5885d80a13c0db1f8e263663d3faee8d0b7e678ad883d0f93f8fd.quiindesign.com/cgi-sys/defaultwebpage.cgi
Submission Tags: phishing malicious Search All
Submission: On November 11 via api from US

DOM tree The "DOM" is the Document Object Model