www.paymentfailed.com Open in urlscan Pro
198.23.59.151  Malicious Activity! Public Scan

Submitted URL: https://payment-fail.com/
Effective URL: https://www.paymentfailed.com/en/login.php
Submission Tags: #phishing @ecarlesi Search All
Submission: On June 26 via api from FI — Scanned from FI

Summary

This website contacted 2 IPs in 1 countries across 3 domains to perform 7 HTTP transactions. The main IP is 198.23.59.151, located in United States and belongs to STEADFAST, US. The main domain is www.paymentfailed.com.
TLS certificate: Issued by cPanel, Inc. Certification Authority on June 25th 2022. Valid for: 3 months.
This is the only time www.paymentfailed.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Netflix (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 170.10.160.91 32748 (STEADFAST)
1 5 198.23.59.151 32748 (STEADFAST)
3 2a00:86c0:209... 40027 (NETFLIX-ASN)
7 2
Apex Domain
Subdomains
Transfer
5 paymentfailed.com
www.paymentfailed.com
54 KB
3 nflxext.com
assets.nflxext.com — Cisco Umbrella Rank: 4589
385 KB
1 payment-fail.com
payment-fail.com
311 B
7 3
Domain Requested by
5 www.paymentfailed.com 1 redirects www.paymentfailed.com
3 assets.nflxext.com www.paymentfailed.com
1 payment-fail.com 1 redirects
7 3

This site contains links to these domains. Also see Links.

Domain
policies.google.com
help.netflix.com
Subject Issuer Validity Valid
paymentfailed.com
cPanel, Inc. Certification Authority
2022-06-25 -
2022-09-23
3 months crt.sh
*.1.nflxso.net
DigiCert TLS RSA SHA256 2020 CA1
2022-06-02 -
2022-07-08
a month crt.sh

This page contains 1 frames:

Primary Page: https://www.paymentfailed.com/en/login.php
Frame ID: DD24EE437B493458A511F95D34D9AAA7
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

Netflix

Page URL History Show full URLs

  1. https://payment-fail.com/ HTTP 302
    https://www.paymentfailed.com/ HTTP 302
    https://www.paymentfailed.com/en/login.php Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

7
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

2
IPs

1
Countries

439 kB
Transfer

634 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://payment-fail.com/ HTTP 302
    https://www.paymentfailed.com/ HTTP 302
    https://www.paymentfailed.com/en/login.php Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
www.paymentfailed.com/en/
Redirect Chain
  • https://payment-fail.com/
  • https://www.paymentfailed.com/
  • https://www.paymentfailed.com/en/login.php
12 KB
3 KB
Document
General
Full URL
https://www.paymentfailed.com/en/login.php
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
198.23.59.151 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
akkyhosting4.mx
Software
LiteSpeed / PHP/7.2.34
Resource Hash
ef575a826f1fd5ccbf84947121a415201e61069f23e4f99a699e826e5196d5d4

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36
accept-language
fi-FI,fi;q=0.9

Response headers

content-encoding
br
content-length
3360
content-type
text/html; charset=UTF-8
date
Sun, 26 Jun 2022 08:30:06 GMT
server
LiteSpeed
vary
Accept-Encoding
x-powered-by
PHP/7.2.34

Redirect headers

alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
cache-control
no-cache, no-store, must-revalidate, max-age=0
content-length
0
content-type
text/html; charset=UTF-8
date
Sun, 26 Jun 2022 08:30:06 GMT
expires
Thu, 19 Nov 1981 08:52:00 GMT
location
en/login.php
pragma
no-cache
server
LiteSpeed
x-powered-by
PHP/7.2.34
style_login.css
www.paymentfailed.com/assets/css/
131 KB
18 KB
Stylesheet
General
Full URL
https://www.paymentfailed.com/assets/css/style_login.css
Requested by
Host: www.paymentfailed.com
URL: https://www.paymentfailed.com/en/login.php
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
198.23.59.151 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
akkyhosting4.mx
Software
LiteSpeed /
Resource Hash
c4f1bc674814c14a91c378aeabcf7697c44cea39d3a67d5e4d73bb3171e457a9

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://www.paymentfailed.com/en/login.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

date
Sun, 26 Jun 2022 08:30:06 GMT
content-encoding
br
last-modified
Wed, 31 Mar 2021 11:40:26 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
text/css
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
18453
expires
Sun, 03 Jul 2022 08:30:06 GMT
MA-en-20210322-popsignuptwoweeks-perspective_alpha_website_large.jpg
assets.nflxext.com/ffe/siteui/vlv3/92bb3a0b-7e91-40a0-b27b-f2c3ac9ef6e4/b8a7920f-4849-4fc6-a430-19bf8409828f/
311 KB
311 KB
Image
General
Full URL
https://assets.nflxext.com/ffe/siteui/vlv3/92bb3a0b-7e91-40a0-b27b-f2c3ac9ef6e4/b8a7920f-4849-4fc6-a430-19bf8409828f/MA-en-20210322-popsignuptwoweeks-perspective_alpha_website_large.jpg
Requested by
Host: www.paymentfailed.com
URL: https://www.paymentfailed.com/en/login.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
2a00:86c0:2090::1 , United States, ASN40027 (NETFLIX-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
cafe2f2257873ec23b02a6464281cb1466456288b74328b3157e787ab9087fad

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://www.paymentfailed.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Date
Sun, 26 Jun 2022 08:30:06 GMT
Last-Modified
Wed, 24 Mar 2021 13:49:31 GMT
Server
nginx
Content-MD5
mtEnXqg9KvTYOwJesJ9xvA==
Content-Type
image/jpeg
Cache-Control
max-age=604801
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
318355
Expires
Sun, 03 Jul 2022 08:30:07 GMT
FB-f-Logo__blue_57.png
assets.nflxext.com/ffe/siteui/login/images/
1 KB
2 KB
Image
General
Full URL
https://assets.nflxext.com/ffe/siteui/login/images/FB-f-Logo__blue_57.png
Requested by
Host: www.paymentfailed.com
URL: https://www.paymentfailed.com/en/login.php
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
2a00:86c0:2090::1 , United States, ASN40027 (NETFLIX-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
3e49d9dc43267590184389ab3da0cb9f7308c9c848667dab109a0f7c73450ece

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://www.paymentfailed.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Date
Sun, 26 Jun 2022 08:30:06 GMT
Last-Modified
Thu, 30 Jun 2016 17:48:49 GMT
Server
nginx
Content-MD5
ozykfvEQtuPsUIa4d2QH0w==
Content-Type
image/png
Cache-Control
max-age=604801
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1455
Expires
Sun, 03 Jul 2022 08:30:07 GMT
jquery.js
www.paymentfailed.com/assets/js/
87 KB
30 KB
Script
General
Full URL
https://www.paymentfailed.com/assets/js/jquery.js
Requested by
Host: www.paymentfailed.com
URL: https://www.paymentfailed.com/en/login.php
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
198.23.59.151 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
akkyhosting4.mx
Software
LiteSpeed /
Resource Hash
ee11e902416a1d896f538103110337b39a0e2e2606bc1faf5cd0652914891127

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://www.paymentfailed.com/en/login.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

date
Sun, 26 Jun 2022 08:30:06 GMT
content-encoding
br
last-modified
Tue, 30 Mar 2021 17:39:30 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
30260
expires
Sun, 03 Jul 2022 08:30:06 GMT
main.js
www.paymentfailed.com/assets/js/
19 KB
3 KB
Script
General
Full URL
https://www.paymentfailed.com/assets/js/main.js
Requested by
Host: www.paymentfailed.com
URL: https://www.paymentfailed.com/en/login.php
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
198.23.59.151 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
akkyhosting4.mx
Software
LiteSpeed /
Resource Hash
2f1a9086e9a0ca360e8047ba888dbc8761de8dda406984b18051664e424e111b

Request headers

accept-language
fi-FI,fi;q=0.9
Referer
https://www.paymentfailed.com/en/login.php
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

date
Sun, 26 Jun 2022 08:30:06 GMT
content-encoding
br
last-modified
Sat, 25 Jun 2022 20:01:56 GMT
server
LiteSpeed
vary
Accept-Encoding
content-type
application/javascript
cache-control
public, max-age=604800
accept-ranges
bytes
content-length
2635
expires
Sun, 03 Jul 2022 08:30:06 GMT
nf-icon-v1-93.woff
assets.nflxext.com/ffe/siteui/fonts/
72 KB
72 KB
Font
General
Full URL
https://assets.nflxext.com/ffe/siteui/fonts/nf-icon-v1-93.woff
Requested by
Host: www.paymentfailed.com
URL: https://www.paymentfailed.com/assets/css/style_login.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
2a00:86c0:2090::1 , United States, ASN40027 (NETFLIX-ASN, US),
Reverse DNS
Software
nginx /
Resource Hash
98713b53a74ebe7e326353080c5f1653e83af61d6363c0b3c4c67d6d24197b4d

Request headers

Referer
https://www.paymentfailed.com/
Origin
https://www.paymentfailed.com
accept-language
fi-FI,fi;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Date
Sun, 26 Jun 2022 08:30:06 GMT
Last-Modified
Mon, 29 Jan 2018 01:50:51 GMT
Server
nginx
Content-MD5
fPYVbMSBJEtaJUNi17c/AA==
Content-Type
font/woff
Access-Control-Allow-Origin
*
Cache-Control
max-age=604801
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
73572
Expires
Sun, 03 Jul 2022 08:30:07 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Netflix (Online)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery object| filter

1 Cookies

Domain/Path Name / Value
www.paymentfailed.com/ Name: PHPSESSID
Value: 2c7246cdc12e973326eea028d8d74123