paka4you.pl
Open in
urlscan Pro
2606:4700:30::6818:770b
Malicious Activity!
Public Scan
Effective URL: https://paka4you.pl/J1y3D6wO/hXkhxaN
Submission: On June 26 via automatic, source phishtank
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on June 26th 2019. Valid for: a year.
This is the only time paka4you.pl was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayU (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 16 | 2606:4700:30:... 2606:4700:30::6818:770b | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
15 | 1 |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
paka4you.pl |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
paka4you.pl
1 redirects
paka4you.pl |
162 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
16 | paka4you.pl |
1 redirects
paka4you.pl
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2019-06-26 - 2020-06-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://paka4you.pl/J1y3D6wO/hXkhxaN
Frame ID: C01B221F1C98564C6B2977289E036FA3
Requests: 15 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://paka4you.pl/J1y3D6wO/hXkhxaN
HTTP 301
https://paka4you.pl/J1y3D6wO/hXkhxaN Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /jquery-ui[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /jquery-ui[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://paka4you.pl/J1y3D6wO/hXkhxaN
HTTP 301
https://paka4you.pl/J1y3D6wO/hXkhxaN Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
hXkhxaN
paka4you.pl/J1y3D6wO/ Redirect Chain
|
15 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.12.4.min.js
paka4you.pl/J1y3D6wO/ |
95 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui-1.12.1.min.js
paka4you.pl/J1y3D6wO/ |
248 KB 63 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style6cda20c4e9f15cdfef26e8b12bdef946.css
paka4you.pl/J1y3D6wO/ |
58 B 126 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
o.pu.js
paka4you.pl/J1y3D6wO/pu_pliki/ |
4 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style6cda20c4e9f15cdfef26e8b12bdef946h.css
paka4you.pl/J1y3D6wO/ |
16 B 178 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
background_1920x1200.jpg
paka4you.pl/J1y3D6wO/pu_pliki/images/ |
59 KB 59 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pu_b_70.png
paka4you.pl/J1y3D6wO/pu_pliki/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 91 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 79 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 211 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 79 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 79 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 212 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online.php
paka4you.pl/J1y3D6wO/ |
0 282 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayU (Financial)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery object| _0x38ea number| przesun number| degree number| loader11 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.paka4you.pl/ | Name: __cfduid Value: d72b0db393b8417e04c5a80ea9c4471c21561570057 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paka4you.pl
2606:4700:30::6818:770b
1dbb56e774834e5cf44bbacfacde7e486ce47b9ce6e77a6113c92450ad255cde
55accff7b642c2d7a402cbe03c1494c0f14a76bc03dee9d47d219562b6a152a5
642a2b0e4d57784ccac5949b621ae934ad5cf71825d3c8c15ef24869ae0ac155
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
bc8be55b20af3c35d6b9872b2489307f00b0cee46cd69a141808cf819f9adfd5
d6483f1097a942fe14ecd5ef063759037b4c69398491a5756933165fc7f8022c
d7dfa3c09a5a62f20ad58ac4c90355ff4b06bd69188b5ec3c490628de7121587
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
ed0a8cdc0853a0c773edfa61b27ce9cda7b61fea879f9cc38d899e173b1fc976