paidy-uselogiin.cc
Open in
urlscan Pro
172.245.134.14
Malicious Activity!
Public Scan
Submission: On March 05 via api from JP — Scanned from JP
Summary
This is the only time paidy-uselogiin.cc was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Paidy (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
16 | 172.245.134.14 172.245.134.14 | 36352 (AS-COLOCR...) (AS-COLOCROSSING) | |
16 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
16 |
paidy-uselogiin.cc
paidy-uselogiin.cc |
770 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
16 | paidy-uselogiin.cc |
paidy-uselogiin.cc
|
16 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
my.paidy.com |
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://paidy-uselogiin.cc/
Frame ID: E16431635570108770686679F946F9A9
Requests: 19 HTTP requests in this frame
Frame:
http://paidy-uselogiin.cc/style/css/saved_resource.html
Frame ID: 5CB99B41A09311C965BF71CECA1DDFFA
Requests: 1 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
paidy-uselogiin.cc/ |
33 KB 17 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.1284167c.chunk.css
paidy-uselogiin.cc/style/css/ |
3 KB 1008 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.6879a8a0.chunk.css
paidy-uselogiin.cc/style/css/ |
172 KB 43 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
LoginBanner.scss
paidy-uselogiin.cc/style/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
saved_resource.html
paidy-uselogiin.cc/style/css/ Frame 5CB9 |
149 B 379 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
7 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg-login-pc.5d80637b.svg
paidy-uselogiin.cc/static/media/ |
548 B 548 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner-mobile.9e617f3e.png
paidy-uselogiin.cc/style/img/ |
708 KB 708 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
499 B 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Bold.ed299f9d.otf
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Regular.df9afa7b.otf
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Bold.f3fa0e8d.woff
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Regular.32cd9b64.woff
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Bold.5ca6f046.woff2
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Regular.05a690be.woff2
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Light.ac3fa27d.otf
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Light.a62cfa74.woff
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
NotoSansCJKjp-sub-Light.53487145.woff2
paidy-uselogiin.cc/static/media/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Paidy (Financial)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| structuredClone object| oncontextlost object| oncontextrestored number| isEasyExec number| isEasyUnKnown number| secondDeviceFlg string| scrid0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
11 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paidy-uselogiin.cc
172.245.134.14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