boatquickcare.com
Open in
urlscan Pro
69.89.31.152
Malicious Activity!
Public Scan
Submission: On February 08 via automatic, source openphish
Summary
This is the only time boatquickcare.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 69.89.31.152 69.89.31.152 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
1 2 | 66.235.134.192 66.235.134.192 | 15224 (OMNITURE) (OMNITURE - Adobe Systems Inc.) | |
1 | 2.18.232.222 2.18.232.222 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
11 | 3 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: box352.bluehost.com
boatquickcare.com |
ASN15224 (OMNITURE - Adobe Systems Inc., US)
PTR: *.d1.sc.omtrdc.net
paypal.d1.sc.omtrdc.net |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a2-18-232-222.deploy.static.akamaitechnologies.com
t.paypal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
boatquickcare.com
boatquickcare.com |
171 KB |
2 |
omtrdc.net
1 redirects
paypal.d1.sc.omtrdc.net |
2 KB |
1 |
paypal.com
t.paypal.com |
494 B |
11 | 3 |
Domain | Requested by | |
---|---|---|
9 | boatquickcare.com |
boatquickcare.com
|
2 | paypal.d1.sc.omtrdc.net | 1 redirects |
1 | t.paypal.com | |
11 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paypal.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error.htm
Frame ID: F673FF49BD4E16AA40F3D2190F063128
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Backbone.js (JavaScript Frameworks) Expand
Detected patterns
- env /^Backbone$/i
PayPal (Payment Processors) Expand
Detected patterns
- env /^PAYPAL$/i
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- script /require.*\.js/i
- env /^requirejs$/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- env /^Modernizr$/i
SiteCatalyst (Analytics) Expand
Detected patterns
- env /^s_(?:account|objectID|code|INST)$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Underscore.js (JavaScript Libraries) Expand
Detected patterns
- env /^Backbone$/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Hai dimenticato l'indirizzo email o la password?
Search URL Search Domain Scan URL
Title: Registrati
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Title: PayPal
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 8- http://paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/s52509002307618?AQB=1&ndh=1&t=8%2F1%2F2019%2017%3A22%3A13%205%200&fid=43AF596D89243549-3FE19E04112F678A&vmt=51437A79&vmf=paypal.112.2o7.net&ce=UTF-8&ns=paypal&pageName=main%3Aunifiedlogin%3A%3A%3Alogin&g=http%3A%2F%2Fboatquickcare.com%2Fapi%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2F5263e3b7d38dfe506c83c6def088ee51%2Findex_error.htm&cc=USD&c1=unifiedloginnodeweb%2Fpublic%2Ftemplates%2Flogin.dust&c7=none&v7=none%3Anone%3Anone&c8=none&c9=none&c17=Accedi%20al%20tuo%20conto%20PayPal&c19=main%3Aunifiedlogin%3A%3A%3Alogin&v19=D%3Dc7&c20=1451570077047&c25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v31=main%3Aunifiedlogin%3A%3A%3Alogin&c35=%3A%3A&c36=boatquickcare.com%2Fapi%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2F5263e3b7d38dfe506c83c6def088ee51%2Findex_error.htm&c37=unifiedlogin&c39=D%3DpageName&c40=e5d12a3a8e35&c47=D%3DpageName&c50=it_it&c53=h.25.3%7C01.17.2013&c71=Nodejs&c72=UTF-8&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1 HTTP 302
- http://paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/s52509002307618?AQB=1&pccr=true&vidn=2E2EDD62850348E2-6000118F6001942A&&ndh=1&t=8%2F1%2F2019%2017%3A22%3A13%205%200&fid=43AF596D89243549-3FE19E04112F678A&vmt=51437A79&vmf=paypal.112.2o7.net&ce=UTF-8&ns=paypal&pageName=main%3Aunifiedlogin%3A%3A%3Alogin&g=http%3A%2F%2Fboatquickcare.com%2Fapi%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2F5263e3b7d38dfe506c83c6def088ee51%2Findex_error.htm&cc=USD&c1=unifiedloginnodeweb%2Fpublic%2Ftemplates%2Flogin.dust&c7=none&v7=none%3Anone%3Anone&c8=none&c9=none&c17=Accedi%20al%20tuo%20conto%20PayPal&c19=main%3Aunifiedlogin%3A%3A%3Alogin&v19=D%3Dc7&c20=1451570077047&c25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v31=main%3Aunifiedlogin%3A%3A%3Alogin&c35=%3A%3A&c36=boatquickcare.com%2Fapi%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2F5263e3b7d38dfe506c83c6def088ee51%2Findex_error.htm&c37=unifiedlogin&c39=D%3DpageName&c40=e5d12a3a8e35&c47=D%3DpageName&c50=it_it&c53=h.25.3%7C01.17.2013&c71=Nodejs&c72=UTF-8&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index_error.htm
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/ |
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app00000.css
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
37 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
moderniz.js
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
4 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
challeng.htm
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
2 KB 1 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
require0.js
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
15 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app00000.js
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
288 KB 105 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pp_jscod.js
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
60 KB 26 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pa000000.js
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
66 KB 14 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
paypal-l.svg
boatquickcare.com/api/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/5263e3b7d38dfe506c83c6def088ee51/index_error_files/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s52509002307618
paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/ Redirect Chain
|
43 B 729 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ts
t.paypal.com/ |
42 B 494 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)43 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| html5 object| Modernizr object| antiClickjack function| require function| requirejs function| define function| getGlobal object| dust function| extend function| $ function| jQuery function| _ object| Backbone object| PAYPAL object| jQuery18006392433990428033 boolean| webkit string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code string| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| scOnload object| fpti string| fptiserverurl string| j object| s_i_paypal2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.boatquickcare.com/ | Name: s_sess Value: %20s_ppv%3D100%3B%20s_cc%3Dtrue%3B%20v31%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%3B%20s_sq%3D%3B |
|
.boatquickcare.com/ | Name: s_pers Value: %20s_fid%3D43AF596D89243549-3FE19E04112F678A%7C1612804933071%3B%20gpv_c43%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1549648333073%3B%20tr_p1%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1549648333080%3B%20gpv_events%3Dno%2520value%7C1549648333081%3B |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
boatquickcare.com
paypal.d1.sc.omtrdc.net
t.paypal.com
2.18.232.222
66.235.134.192
69.89.31.152
1414c46643d3eceef2349af23015e613c32229530c0ebd4214ab62f87d1e0f81
1bbc33774d6bb79a9ae441cd68bd8fb206547f84f0414e16ee828c353464066b
1e69fd1a89a22472b265ac71cb8d2104f9ce340cd205bd9c5a8133a0d02a6f68
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
8dd28e021f1c4f6be67e1f58a7c5123caaee2ddb6fc18603cc2f4561b9ccea59
98ecaad59fce14516bd1c79d6361e1f798a6cf3d077b68b5807adc153c5fb389
9bbf1ce51d9751054757ff383e410a379a4b1ee26527334f4add83fbfba1d36c
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0
fded66d2c4f6de8de0fa62f747352f884e5904221dfd997c3280b79f997adbd9