box2038.temp.domains Open in urlscan Pro
74.220.219.246  Malicious Activity! Public Scan

Submitted URL: http://box2038.temp.domains/%7Eimpotssr/FR.fr-login.paypal/inc/websrc/form/
Effective URL: http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Submission Tags: phishing malicious Search All
Submission: On April 15 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 74.220.219.246, located in United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is box2038.temp.domains.
This is the only time box2038.temp.domains was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 6 74.220.219.246 46606 (UNIFIEDLA...)
5 1
Apex Domain
Subdomains
Transfer
6 temp.domains
box2038.temp.domains
158 KB
5 1
Domain Requested by
6 box2038.temp.domains 1 redirects box2038.temp.domains
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Frame ID: 87CD92754A2F91FDD09FAB282E1EBF0E
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/ HTTP 302
    http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9d... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

158 kB
Transfer

210 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/ HTTP 302
    http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request secure.php
box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/
Redirect Chain
  • http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/
  • http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
2 KB
1 KB
Document
General
Full URL
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Protocol
HTTP/1.1
Server
74.220.219.246 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box2038.bluehost.com
Software
Apache /
Resource Hash
20caf1d69148b17737ab3af8b3d9b8d821e7a6572d8c304561cfd3096152952b

Request headers

Host
box2038.temp.domains
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=d252b565e532885cb2d5126bac76bef5
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 15 Apr 2021 14:24:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
Content-Length
811
Keep-Alive
timeout=5, max=74
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Thu, 15 Apr 2021 14:24:36 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=d252b565e532885cb2d5126bac76bef5; path=/
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
Location
secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
Content-Length
0
Keep-Alive
timeout=5, max=75
Content-Type
text/html; charset=UTF-8
home.css
box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/css/
5 KB
2 KB
Stylesheet
General
Full URL
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/css/home.css
Requested by
Host: box2038.temp.domains
URL: http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Protocol
HTTP/1.1
Server
74.220.219.246 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box2038.bluehost.com
Software
Apache /
Resource Hash
e2c6268c250382105e56b7bfc4b894a7bb4b254f467c1557abd58e310f900623

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
box2038.temp.domains
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Cookie
PHPSESSID=d252b565e532885cb2d5126bac76bef5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 15 Apr 2021 14:24:37 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Apr 2021 13:28:13 GMT
Server
Apache
Accept-Ranges
bytes
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
Keep-Alive
timeout=5, max=73
Content-Length
1641
lock.gif
box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/img/
114 KB
114 KB
Image
General
Full URL
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/img/lock.gif
Requested by
Host: box2038.temp.domains
URL: http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Protocol
HTTP/1.1
Server
74.220.219.246 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box2038.bluehost.com
Software
Apache /
Resource Hash
d106a2a257150e602c55279e0e932dc4fb9424c9a8fd68454deb7560c49ae36c

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
box2038.temp.domains
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Cookie
PHPSESSID=d252b565e532885cb2d5126bac76bef5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 15 Apr 2021 14:24:38 GMT
Last-Modified
Wed, 14 Apr 2021 13:28:13 GMT
Server
Apache
Accept-Ranges
bytes
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
Content-Type
image/gif
Keep-Alive
timeout=5, max=75
Content-Length
116740
effect.js
box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/js/
87 KB
38 KB
Script
General
Full URL
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/js/effect.js
Requested by
Host: box2038.temp.domains
URL: http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Protocol
HTTP/1.1
Server
74.220.219.246 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box2038.bluehost.com
Software
Apache /
Resource Hash
e06ea087a8af5a81de6e9cdfc00b128cb71c24f5638adf36f4516b86f13444cf

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
box2038.temp.domains
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
*/*
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Cookie
PHPSESSID=d252b565e532885cb2d5126bac76bef5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 15 Apr 2021 14:24:38 GMT
Content-Encoding
gzip
Last-Modified
Wed, 14 Apr 2021 13:28:13 GMT
Server
Apache
Accept-Ranges
bytes
Vary
Accept-Encoding
Upgrade
h2,h2c
Transfer-Encoding
chunked
Connection
Upgrade, Keep-Alive
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
Content-Type
application/javascript
Keep-Alive
timeout=5, max=75
logoP.PNG
box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/img/
2 KB
2 KB
Image
General
Full URL
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/img/logoP.PNG
Requested by
Host: box2038.temp.domains
URL: http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Protocol
HTTP/1.1
Server
74.220.219.246 , United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
box2038.bluehost.com
Software
Apache /
Resource Hash
6428bbee9e440ef25cd7b91d6e5debfb62159f4aa6374fdd0452e38420a53b13

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
box2038.temp.domains
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
Cookie
PHPSESSID=d252b565e532885cb2d5126bac76bef5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://box2038.temp.domains/~impotssr/FR.fr-login.paypal/inc/websrc/form/secure.php?token=e4d7f91b08cc9ddba791b185708c66e4
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 15 Apr 2021 14:24:38 GMT
Last-Modified
Wed, 14 Apr 2021 13:28:13 GMT
Server
Apache
Accept-Ranges
bytes
Upgrade
h2,h2c
Connection
Upgrade, Keep-Alive
host-header
c2hhcmVkLmJsdWVob3N0LmNvbQ==
Content-Type
image/png
Keep-Alive
timeout=5, max=75
Content-Length
2084

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery

0 Cookies