Submitted URL: https://web10.z12.web.core.windows.net/
Effective URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8E...
Submission: On May 18 via manual from US

Summary

This website contacted 3 IPs in 3 countries across 2 domains to perform 11 HTTP transactions. The main IP is 52.168.171.67, located in Washington, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is 52.168.171.67.
This is the only time 52.168.171.67 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 52.239.148.1 8075 (MICROSOFT...)
9 52.168.171.67 8075 (MICROSOFT...)
1 151.101.114.133 54113 (FASTLY)
11 3
Apex Domain
Subdomains
Transfer
1 paypalobjects.com
www.paypalobjects.com
2 KB
1 windows.net
web10.z12.web.core.windows.net
444 B
11 2
Domain Requested by
1 www.paypalobjects.com 52.168.171.67
1 web10.z12.web.core.windows.net
11 2

This site contains no links.

Subject Issuer Validity Valid
*.web.core.windows.net
Microsoft IT TLS CA 2
2020-04-17 -
2022-04-17
2 years crt.sh
www.paypalobjects.com
DigiCert SHA2 Extended Validation Server CA
2019-12-09 -
2021-12-13
2 years crt.sh

This page contains 1 frames:

Primary Page: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Frame ID: 356D3D44A8A5D4EDB7B73A95E531F372
Requests: 11 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://web10.z12.web.core.windows.net/ Page URL
  2. http://52.168.171.67/paypal/ Page URL
  3. http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

11
Requests

18 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

3
Countries

115 kB
Transfer

405 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://web10.z12.web.core.windows.net/ Page URL
  2. http://52.168.171.67/paypal/ Page URL
  3. http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
web10.z12.web.core.windows.net/
75 B
444 B
Document
General
Full URL
https://web10.z12.web.core.windows.net/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.148.1 Seoul, Korea, Republic Of, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash

Request headers

Host
web10.z12.web.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
75
Content-Type
text/html
Content-MD5
sp3viGFTtgKmvfbWaon/iA==
Last-Modified
Mon, 18 May 2020 20:10:27 GMT
Accept-Ranges
bytes
ETag
"0x8D7FB6781E1679F"
Server
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
0dccc889-f01e-0046-7166-2dfafb000000
x-ms-version
2018-03-28
Date
Mon, 18 May 2020 22:51:41 GMT
Cookie set /
52.168.171.67/paypal/
205 B
618 B
Document
General
Full URL
http://52.168.171.67/paypal/
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
6e88499da1507321ff52aec45305c1691a416c2ce354dd2dbf2487c67c2a460f

Request headers

Host
52.168.171.67
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Server
Apache/2.4.29 (Ubuntu)
Set-Cookie
PHPSESSID=q2rulnn6iv2md5g3fjs5nd9ad8; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
198
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Primary Request Login.php
52.168.171.67/paypal/
5 KB
2 KB
Document
General
Full URL
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
2c88a7acd67be547228dfab64801533c07416f55c5a73ed2d71ede6a20ba8b7e

Request headers

Host
52.168.171.67
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://52.168.171.67/paypal/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=q2rulnn6iv2md5g3fjs5nd9ad8
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://52.168.171.67/paypal/

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Server
Apache/2.4.29 (Ubuntu)
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1820
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
jquery-1.9.1.js
52.168.171.67/paypal/assets/js/
262 KB
78 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery-1.9.1.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4185d-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
jquery.validate.min.js
52.168.171.67/paypal/assets/js/
21 KB
7 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery.validate.min.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8244de8a4015fa72470e8be9b4203dd6238883d2c5f6a46263521bb5da9e2d70

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"525b-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
6367
jquery.payment.js
52.168.171.67/paypal/assets/js/
18 KB
4 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery.payment.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
be95b37feb362dde4041a91a7768a45c97b0105af734ff67228cbfe03d951237

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4646-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3788
additional-methods.min.js
52.168.171.67/paypal/assets/js/
17 KB
5 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/additional-methods.min.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
393fa2ab0c3d90fb4c65d96eb9240ac527e3553a6c3b5bb4675a852f148c812d

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"42b1-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4915
jquery.maskedinput.js
52.168.171.67/paypal/assets/js/
10 KB
3 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery.maskedinput.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e6ad5c12a1ad8a9ffcde1e1c2ee42a9590cee19c8e233094da4f117dd2641a7c

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"284e-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2647
Valid.UK.js
52.168.171.67/paypal/assets/js/
36 KB
6 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/Valid.UK.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7aefd97e32fa89f90ea7c14ce96f1a6b5bd68443d5d7e67c52114dd44f46fbd6

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9196-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Language
uk
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5, max=99
Content-Length
5788
app.css
52.168.171.67/paypal/assets/css/
32 KB
6 KB
Stylesheet
General
Full URL
http://52.168.171.67/paypal/assets/css/app.css
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7822b5da5f2f1b760250f1d4d88971b07128255dd934516dd3f916acbfbac14f

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=k7IDV2ejCj9Dk6ia0hZtlj4OzcsLpWLk3dCXmrdMemfBb4vVfNS8EnktJdCwKM9sPiijPI7nx5Slwq03
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 22:51:43 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7e08-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
5978
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/assets/js/jquery-1.9.1.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Referer
http://52.168.171.67/paypal/assets/css/app.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 18 May 2020 22:51:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
5109486
x-cache
HIT, HIT
status
200
surrorage-key
/images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared /images
vary
Accept-Encoding
content-length
1929
via
1.1 varnish, 1.1 varnish
x-served-by
cache-lax8645-LAX, cache-hhn4027-HHN
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
x-timer
S1589842304.811840,VS0,VE0
strict-transport-security
max-age=31557600
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
173263, 349688

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| validateForm function| removeEmailError function| removeEmailErrorFocus function| removePasswordError function| removePasswordErrorFocus object| jQuery19105918487791314659

1 Cookies

Domain/Path Name / Value
52.168.171.67/ Name: PHPSESSID
Value: q2rulnn6iv2md5g3fjs5nd9ad8