update-account-credit-service.server-activation.limit.e4cb.com
Open in
urlscan Pro
131.153.37.2
Malicious Activity!
Public Scan
Effective URL: https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/secureaccount.php?country.x=PL&locale.x=pl_PL&customer.x=ID-PA$...
Submission Tags: phishing malicious Search All
Submission: On September 09 via api from US
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on September 1st 2020. Valid for: 3 months.
This is the only time update-account-credit-service.server-activation.limit.e4cb.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 8 | 131.153.37.2 131.153.37.2 | 20454 (SSASN2) (SSASN2) | |
5 | 104.111.228.123 104.111.228.123 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
10 | 2 |
ASN20454 (SSASN2, US)
PTR: svr156.edns1.com
update-account-credit-service.server-activation.limit.e4cb.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-111-228-123.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
e4cb.com
3 redirects
update-account-credit-service.server-activation.limit.e4cb.com |
197 KB |
5 |
paypalobjects.com
www.paypalobjects.com |
145 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
8 | update-account-credit-service.server-activation.limit.e4cb.com |
3 redirects
update-account-credit-service.server-activation.limit.e4cb.com
|
5 | www.paypalobjects.com |
update-account-credit-service.server-activation.limit.e4cb.com
|
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
update-account-credit-service.server-activation.limit.e4cb.com cPanel, Inc. Certification Authority |
2020-09-01 - 2020-11-30 |
3 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/secureaccount.php?country.x=PL&locale.x=pl_PL&customer.x=ID-PA$1$RkPakqW7$W79bkF.krkIv2CkxAfCVk.&safety=cdT24mj01tW29NkD6LS35vI0Zbro01faus33i5H8KgAdU2zdEqXG8fc1yd4F2793Bfed6JhOfQ7wV14Rfl3pYPn6M8fCx3
Frame ID: 3421D4E3FED896A3C6607ED7C4F4E386
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://update-account-credit-service.server-activation.limit.e4cb.com/
HTTP 302
https://update-account-credit-service.server-activation.limit.e4cb.com/to.php HTTP 302
https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4 HTTP 301
https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/ Page URL
- https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/secureaccount.php?country.x=PL&locale.x=pl_... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://update-account-credit-service.server-activation.limit.e4cb.com/
HTTP 302
https://update-account-credit-service.server-activation.limit.e4cb.com/to.php HTTP 302
https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4 HTTP 301
https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/ Page URL
- https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/secureaccount.php?country.x=PL&locale.x=pl_PL&customer.x=ID-PA$1$RkPakqW7$W79bkF.krkIv2CkxAfCVk.&safety=cdT24mj01tW29NkD6LS35vI0Zbro01faus33i5H8KgAdU2zdEqXG8fc1yd4F2793Bfed6JhOfQ7wV14Rfl3pYPn6M8fCx3 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://update-account-credit-service.server-activation.limit.e4cb.com/ HTTP 302
- https://update-account-credit-service.server-activation.limit.e4cb.com/to.php HTTP 302
- https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4 HTTP 301
- https://update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/ Redirect Chain
|
285 B 667 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
secureaccount.php
update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/open/js/ |
85 KB 85 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xappx.css
update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/open/css/ |
108 KB 108 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xsecx.js
update-account-credit-service.server-activation.limit.e4cb.com/50862d9169b388a36bcc0b0410715ab4/open/js/ |
268 B 486 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
monogram@2x.png
www.paypalobjects.com/images/shared/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
animation-oval.png
www.paypalobjects.com/images/shared/ |
2 KB 3 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
48 KB 48 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
46 KB 46 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Regular.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
46 KB 47 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
update-account-credit-service.server-activation.limit.e4cb.com/ | Name: PHPSESSID Value: d850b18e4d7d684fe9cc05f8c5ff4797 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
update-account-credit-service.server-activation.limit.e4cb.com
www.paypalobjects.com
104.111.228.123
131.153.37.2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