vvtx.org
Open in
urlscan Pro
2606:4700:20::ac43:478d
Malicious Activity!
Public Scan
Effective URL: https://vvtx.org/q72702717p2e1c42a418ad07c592057176d5.html&data_05
Submission: On October 08 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 24th 2024. Valid for: 3 months.
This is the only time vvtx.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 2606:4700:20:... 2606:4700:20::ac43:478d | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
6 | 2606:4700:20:... 2606:4700:20::681a:8e9 | () () | |
10 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cybeready.net
lp.cybeready.net |
9 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 220 |
31 KB |
2 |
vvtx.org
vvtx.org |
2 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
6 | lp.cybeready.net |
vvtx.org
|
2 | cdnjs.cloudflare.com |
vvtx.org
|
2 | vvtx.org |
cdnjs.cloudflare.com
|
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
vvtx.org WE1 |
2024-08-24 - 2024-11-22 |
3 months | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
cybeready.net E5 |
2024-08-12 - 2024-11-10 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://vvtx.org/q72702717p2e1c42a418ad07c592057176d5.html&data_05
Frame ID: 3DDF7FE27FB846E43F4A36F51BB51186
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Log in to your PayPal accountPage URL History Show full URLs
-
http://vvtx.org/q72702717p2e1c42a418ad07c592057176d5.html&data_05
HTTP 307
https://vvtx.org/q72702717p2e1c42a418ad07c592057176d5.html&data_05 Page URL
Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://vvtx.org/q72702717p2e1c42a418ad07c592057176d5.html&data_05
HTTP 307
https://vvtx.org/q72702717p2e1c42a418ad07c592057176d5.html&data_05 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
q72702717p2e1c42a418ad07c592057176d5.html&data_05
vvtx.org/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.3.0/css/ |
23 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sanitize.css
lp.cybeready.net/Forms/PayPal/ |
475 B 655 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.css
lp.cybeready.net/Forms/PayPal/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/2.1.3/ |
82 KB 27 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
landing-page.js
lp.cybeready.net/common/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
validator.js
lp.cybeready.net/Forms/PayPal/ |
1 KB 794 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
lp.cybeready.net/Forms/PayPal/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
q72702717p2e1c42a418ad07c592057176d5.html&data_05
vvtx.org/ |
0 330 B |
XHR
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
lp.cybeready.net/Forms/PayPal/ |
5 KB 2 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| getcrrid function| $ function| jQuery object| validator1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vvtx.org/ | Name: requestid Value: 563aa9ea6f6be61a13268e6ad873dab7 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
lp.cybeready.net
vvtx.org
104.17.24.14
2606:4700:20::681a:8e9
2606:4700:20::ac43:478d
1690c4e20869c3763b7fc111e2f94035b0a7ee830311dd680ac91421daad3667
2051d61446d4dbffb03727031022a08c84528ab44d203a7669c101e5fbdd5515
52227d0b9b14b5ea88d3a9cde57e33bf433bf470ce5fa0d7d25880b65acd4b30
541ac58217a8ade1a5e292a65a0661dc9db7a49ae13654943817a4fbc6761afd
633d39e293d4a1e9f9c461323d6d3913f3ee51ab8cc901e4c45356cf022634ca
6a449b4722f14af5cb2a4bcc627a7c324c804147feab1e56230a9712131ce116
a9b256db06d1375373bd2a291d7813cb86617cd749966d158bee4f6e791a85f6
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
de005a085d04e99623239533e8e8ca3fd8dd4731139739c4d5428661a7247833
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855