ipaypa1-profile-info920kw.netlify.app Open in urlscan Pro
2a03:b0c0:3:e0::27e:2001  Malicious Activity! Public Scan

Submitted URL: https://t.ly/7gQQzu8TxMqGTkd4ZYAH
Effective URL: https://ipaypa1-profile-info920kw.netlify.app/pc.html
Submission Tags: phishing malicious Search All
Submission: On November 11 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 1 HTTP transactions. The main IP is 2a03:b0c0:3:e0::27e:2001, located in Frankfurt am Main, Germany and belongs to DIGITALOCEAN-ASN, US. The main domain is ipaypa1-profile-info920kw.netlify.app.
TLS certificate: Issued by AlphaSSL CA - SHA256 - G2 on March 4th 2020. Valid for: a year.
This is the only time ipaypa1-profile-info920kw.netlify.app was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
1 2a03:b0c0:3:e... 14061 (DIGITALOC...)
1 2
Apex Domain
Subdomains
Transfer
1 netlify.app
ipaypa1-profile-info920kw.netlify.app
109 KB
1 t.ly
t.ly
925 B
1 2
Domain Requested by
1 ipaypa1-profile-info920kw.netlify.app
1 t.ly 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
*.netlify.app
AlphaSSL CA - SHA256 - G2
2020-03-04 -
2021-03-05
a year crt.sh

This page contains 1 frames:

Primary Page: https://ipaypa1-profile-info920kw.netlify.app/pc.html
Frame ID: 2524AA3C0E297E26FE73CC37DEDC2302
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://t.ly/7gQQzu8TxMqGTkd4ZYAH HTTP 301
    https://ipaypa1-profile-info920kw.netlify.app/pc.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^Netlify/i

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

109 kB
Transfer

294 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://t.ly/7gQQzu8TxMqGTkd4ZYAH HTTP 301
    https://ipaypa1-profile-info920kw.netlify.app/pc.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request pc.html
ipaypa1-profile-info920kw.netlify.app/
Redirect Chain
  • https://t.ly/7gQQzu8TxMqGTkd4ZYAH
  • https://ipaypa1-profile-info920kw.netlify.app/pc.html
289 KB
109 KB
Document
General
Full URL
https://ipaypa1-profile-info920kw.netlify.app/pc.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a03:b0c0:3:e0::27e:2001 Frankfurt am Main, Germany, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
Software
Netlify /
Resource Hash
718423565a33c9bd8a744dcf6b509424040eb574f631c998ac56fa485529ff67
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Request headers

:method
GET
:authority
ipaypa1-profile-info920kw.netlify.app
:scheme
https
:path
/pc.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

status
200
cache-control
public, max-age=0, must-revalidate
content-type
text/html; charset=UTF-8
date
Wed, 11 Nov 2020 14:45:51 GMT
etag
"4459e9ad7dcf51fa6eaa9cd917c2c25f-ssl-df"
strict-transport-security
max-age=31536000; includeSubDomains; preload
content-encoding
br
content-length
111682
age
9768
server
Netlify
vary
Accept-Encoding
x-nf-request-id
678a4629-8c2a-41aa-83ff-12dd8f645336-18334458

Redirect headers

status
301
date
Wed, 11 Nov 2020 17:28:39 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=d166210907c7119ded21ba18d6c3f4a7d1605115718; expires=Fri, 11-Dec-20 17:28:38 GMT; path=/; domain=.t.ly; HttpOnly; SameSite=Lax XSRF-TOKEN=eyJpdiI6IkZPenh5M0RwbzhtSWhQNVhWUEtwa3c9PSIsInZhbHVlIjoiUEczSTBkZERYVVBNN1wvMDFyZVM1ZjVPMFZGU1JzMDRpRE1nVGNuVnFkb2sxVnRPa0dhcVA5OFh5SUNIMk5PWEIiLCJtYWMiOiJhMWFjYjIxNWQ5NjFmY2I1YWEyOWQ1NjcwZmQ3ZTAyMjg2MzEyODg4OWJmN2QwYzljOTJjYzcwZGRkM2IxN2EzIn0%3D; expires=Wed, 25-Nov-2020 17:28:39 GMT; Max-Age=1209600; path=/
location
https://ipaypa1-profile-info920kw.netlify.app/pc.html
x-frame-options
SAMEORIGIN
x-xss-protection
1; mode=block
x-content-type-options
nosniff
cf-cache-status
DYNAMIC
cf-request-id
0659f3442d00002bddf7b06000000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=RC2RaB1U1PFq7fkMc9JMdi1RUe2RPzR3nRJ5SmA3jHcvTeANoraV0XWHBGNBvONluzUjsffxWoDyTW46aHOvDlUm3Tw8Jt479eo0Tm7xnz%2Bl"}],"group":"cf-nel","max_age":604800}
nel
{"report_to":"cf-nel","max_age":604800}
server
cloudflare
cf-ray
5f09bb19eb0d2bdd-FRA
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3d6fd1d01b7b8800c81c9557eab05a0ca5858483c426e0ba9bdca515dd7b2521

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

ipaypa1-profile-info920kw.netlify.app
t.ly
2606:4700:3031::681f:5b37
2a03:b0c0:3:e0::27e:2001
3d6fd1d01b7b8800c81c9557eab05a0ca5858483c426e0ba9bdca515dd7b2521
718423565a33c9bd8a744dcf6b509424040eb574f631c998ac56fa485529ff67