timetravel.mementoweb.org
Open in
urlscan Pro
52.40.90.220
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On October 29 via api from US
Summary
This is the only time timetravel.mementoweb.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 52.40.90.220 52.40.90.220 | 16509 (AMAZON-02) (AMAZON-02) | |
9 | 104.108.64.37 104.108.64.37 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
3 | 151.101.65.35 151.101.65.35 | 54113 (FASTLY) (FASTLY) | |
1 2 | 64.4.245.84 64.4.245.84 | 17012 (PAYPAL) (PAYPAL) | |
21 | 4 |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-40-90-220.us-west-2.compute.amazonaws.com
timetravel.mementoweb.org |
ASN16625 (AKAMAI-AS, US)
PTR: a104-108-64-37.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
paypalobjects.com
www.paypalobjects.com |
85 KB |
8 |
mementoweb.org
timetravel.mementoweb.org |
14 KB |
5 |
paypal.com
1 redirects
c.paypal.com b.stats.paypal.com dub.stats.paypal.com t.paypal.com |
22 KB |
21 | 3 |
Domain | Requested by | |
---|---|---|
9 | www.paypalobjects.com |
timetravel.mementoweb.org
www.paypalobjects.com |
8 | timetravel.mementoweb.org |
timetravel.mementoweb.org
www.paypalobjects.com |
2 | c.paypal.com |
www.paypalobjects.com
c.paypal.com |
1 | t.paypal.com | |
1 | dub.stats.paypal.com | |
1 | b.stats.paypal.com | 1 redirects |
21 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
c.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-06-24 - 2022-06-29 |
2 years | crt.sh |
b.stats.paypal.com DigiCert SHA2 High Assurance Server CA |
2020-03-13 - 2022-06-03 |
2 years | crt.sh |
t.paypal.com DigiCert SHA2 High Assurance Server CA |
2020-07-15 - 2022-07-20 |
2 years | crt.sh |
This page contains 3 frames:
Primary Page:
http://timetravel.mementoweb.org/reconstruct/20141123205914mp_/https://www.paypal.com/signin?returnuri=https:/www.paypal
Frame ID: 25982FA80064497197920D9B5A608C44
Requests: 19 HTTP requests in this frame
Frame:
https://c.paypal.com/v1/r/d/i?js_src=https://c.paypal.com/da/r/fb.js
Frame ID: 622664D1D0917120EAD3366A150DBDCF
Requests: 1 HTTP requests in this frame
Frame:
https://dub.stats.paypal.com/v1/counter2.cgi?r=cD03M2EwYjRlMmFlNjk0MTQxYTM0MjIxZGMyODYxMTY5YyZpPTUyLjQwLjkwLjIyMCZ0PTE2MDM5ODA3OTIuMzgxJmE9MjEmcz1VTklGSUVEX0xPR0lOZqCeVcsDUinfqMc7SNjO6iXP5sA
Frame ID: F13A60AE79E00497F33151E8C4F82519
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 16- https://b.stats.paypal.com/v1/counter.cgi?r=cD03M2EwYjRlMmFlNjk0MTQxYTM0MjIxZGMyODYxMTY5YyZpPTUyLjQwLjkwLjIyMCZ0PTE2MDM5ODA3OTIuMzgxJmE9MjEmcz1VTklGSUVEX0xPR0lOZqCeVcsDUinfqMc7SNjO6iXP5sA HTTP 302
- https://dub.stats.paypal.com/v1/counter2.cgi?r=cD03M2EwYjRlMmFlNjk0MTQxYTM0MjIxZGMyODYxMTY5YyZpPTUyLjQwLjkwLjIyMCZ0PTE2MDM5ODA3OTIuMzgxJmE9MjEmcz1VTklGSUVEX0xPR0lOZqCeVcsDUinfqMc7SNjO6iXP5sA
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
signin
timetravel.mementoweb.org/reconstruct/20141123205914mp_/https://www.paypal.com/ |
25 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ngrlCaptcha.min.js
www.paypalobjects.com/webcaptcha/ |
21 KB 6 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
contextualLogin.css
www.paypalobjects.com/web/res/48b/1f1f9314cf905c4d717f3fafbd731/css/ |
98 KB 17 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
modernizr-2.6.1.js
www.paypalobjects.com/web/res/48b/1f1f9314cf905c4d717f3fafbd731/js/lib/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-PN-check.png
www.paypalobjects.com/images/shared/ |
1 KB 1 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
glyph_alert_critical_big-2x.png
www.paypalobjects.com/images/shared/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fn-sync-telemetry-min.js
www.paypalobjects.com/web/res/48b/1f1f9314cf905c4d717f3fafbd731/js/lib/ |
5 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin-split.js
www.paypalobjects.com/web/res/48b/1f1f9314cf905c4d717f3fafbd731/js/ |
130 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
www.paypalobjects.com/pa/js/min/ |
48 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
recaptchav3.js
timetravel.mementoweb.org/auth/createchallenge/81fdc67a26505647/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb.js
c.paypal.com/da/r/ |
59 KB 20 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
challenge.js
timetravel.mementoweb.org/auth/createchallenge/135de3399ea969a4/ |
555 B 710 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
client-log
timetravel.mementoweb.org/signin/ |
555 B 710 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cookie-banner
timetravel.mementoweb.org/signin/ |
555 B 710 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
timetravel.mementoweb.org/signin/ |
555 B 710 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
i
c.paypal.com/v1/r/d/ Frame 6226 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
counter2.cgi
dub.stats.paypal.com/v1/ Frame F13A Redirect Chain
|
42 B 299 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ts
t.paypal.com/ |
42 B 664 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
timetravel.mementoweb.org/signin/ |
555 B 710 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
load-resource
timetravel.mementoweb.org/signin/ |
555 B 710 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| trustedTypes boolean| paypalADSInterceptorInjected object| html5 object| Modernizr function| isEligibleIntegration object| antiClickjack object| PAYPAL function| $ object| fpti string| fptiserverurl object| _ifpti1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
timetravel.mementoweb.org/reconstruct/20141123205914mp_/https://www.paypal.com | Name: pywb.timestamp Value: 20201029141312 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
b.stats.paypal.com
c.paypal.com
dub.stats.paypal.com
t.paypal.com
timetravel.mementoweb.org
www.paypalobjects.com
104.108.64.37
151.101.65.35
52.40.90.220
64.4.245.84
017fc6b1bdc17a8b54da3cc15394703b6bd62387fe053d0390c6ca263cc051e8
04748dd9a27ac47177d01a763fd68b4ca09f5b9acb4208149f2de40251d07dd2
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292
5396af5006928832517239a2145e9de4bfde558161bd68be9a4b57ea5f37acf5
55017f38fdb4c3395f620733cccd07cf55365a391abd8209dcced49676f35f16
6d83b77c3d8c5c0ccc7078540a1fb0bd9fa43eeb82b89f83264d469aa100c088
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
8b202d5bd55968ce4bfc21c063166eaebe62104275ce7ec362d78b64b2581c95
a05bfcc78e0f6ed6c0e388b98396f1729ff2f8760bd7bee8801f55dc035c60a0
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
b983de83ef078e5d567be19b5724c4e9666b4f1dd4ead74b291b88d920b2a21c
cb7e6d1674d228302c6b5b0bc377321c6e389197987d4904fb6badeb7b7ff89a
e711da1cd6290cf3026aca21c77f526a0907e2f0aabc7e60332af7aa704267e3