URL: http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Submission: On April 15 via automatic, source phishtank

Summary

This website contacted 4 IPs in 3 countries across 4 domains to perform 6 HTTP transactions. The main IP is 85.17.185.49, located in Netherlands and belongs to LEASEWEB-NL-AMS-01 Netherlands, NL. The main domain is www.maannioda.com.
This is the only time www.maannioda.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 85.17.185.49 60781 (LEASEWEB-...)
3 2.18.233.20 16625 (AKAMAI-AS)
1 52.222.149.133 16509 (AMAZON-02)
6 4
Domain Requested by
3 www.paypalobjects.com www.maannioda.com
1 d33v4339jhl8k0.cloudfront.net www.maannioda.com
1 www.maannioda.com
0 s17.postimg.org Failed www.maannioda.com
6 4

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Frame ID: F4D839DDC21F3FF3FB21E339664579B3
Requests: 6 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Page Statistics

6
Requests

0 %
HTTPS

0 %
IPv6

4
Domains

4
Subdomains

4
IPs

3
Countries

82 kB
Transfer

179 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request e4889f1c65681a3e30650ee4cf68ff8c-
www.maannioda.com/graywbz/
9 KB
9 KB
Document
General
Full URL
http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Protocol
HTTP/1.1
Server
85.17.185.49 , Netherlands, ASN60781 (LEASEWEB-NL-AMS-01 Netherlands, NL),
Reverse DNS
ln03.mxout.alfaservers.com
Software
Apache /
Resource Hash
a4ed242a67570f3bc82cb379c98f7f187b17986e9da27bde6b2c55cf54c48830

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
www.maannioda.com
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Sun, 15 Apr 2018 02:22:39 GMT
Last-Modified
Sun, 30 Apr 2017 04:54:32 GMT
Server
Apache
Content-Type
text/html
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
8946
app.css
www.paypalobjects.com/eboxapps/css/f1/2098424bd3220ba2522b26543f3441/
116 KB
18 KB
Stylesheet
General
Full URL
https://www.paypalobjects.com/eboxapps/css/f1/2098424bd3220ba2522b26543f3441/app.css
Requested by
Host: www.maannioda.com
URL: http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Protocol
SPDY
Server
2.18.233.20 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
07d8ad4cb3a4151f78452da62f1eed6efb7873ebc6431ffcabd90dfeb64908b8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

date
Sun, 15 Apr 2018 02:22:38 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Mon, 17 Mar 2014 23:34:53 GMT
server
Apache
vary
Accept-Encoding
content-type
text/css
status
200
cache-control
max-age=7776000
strict-transport-security
max-age=31536000
accept-ranges
bytes
content-length
18318
expires
Sat, 14 Jul 2018 02:22:38 GMT
logo_paypal_106x29.png
s17.postimg.org/dikobvhbz/
0
0

file-tHlBk2a147.png
d33v4339jhl8k0.cloudfront.net/docs/assets/55d20ae1e4b089486cadc329/images/56b226dac69791436156504d/
50 KB
51 KB
Image
General
Full URL
http://d33v4339jhl8k0.cloudfront.net/docs/assets/55d20ae1e4b089486cadc329/images/56b226dac69791436156504d/file-tHlBk2a147.png
Requested by
Host: www.maannioda.com
URL: http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Protocol
HTTP/1.1
Server
52.222.149.133 Seattle, United States, ASN16509 (AMAZON-02 - Amazon.com, Inc., US),
Reverse DNS
server-52-222-149-133.fra53.r.cloudfront.net
Software
AmazonS3 /
Resource Hash
385c73df0a61b2ecd123b010f18a6c768ffff9a8a395436fcca04663533a9e6e

Request headers

Referer
http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

Date
Mon, 20 Nov 2017 05:21:20 GMT
Via
1.1 2f43d3215923fbce97b22ee733b0401f.cloudfront.net (CloudFront)
Last-Modified
Wed, 03 Feb 2016 16:12:11 GMT
Server
AmazonS3
Age
37203
ETag
"1f91af531589da71a76327ab25b454ff"
X-Cache
Hit from cloudfront
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
51700
X-Amz-Cf-Id
1OgxLS_LOuG1qSpJJYJD5vpVFoA0_AZwwN14H7aB9dDeDBsdseHDrw==
scr_content-bkgd.png
www.paypalobjects.com/webstatic/i/ex_ce2/scr/
3 KB
3 KB
Image
General
Full URL
https://www.paypalobjects.com/webstatic/i/ex_ce2/scr/scr_content-bkgd.png
Requested by
Host: www.maannioda.com
URL: http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Protocol
SPDY
Server
2.18.233.20 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
0de9dc4df795b30e9fa458090c49ab8137e65a7901803c81895cef56ac543d13
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.paypalobjects.com/eboxapps/css/f1/2098424bd3220ba2522b26543f3441/app.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 15 Apr 2018 02:22:38 GMT
x-content-type-options
nosniff
last-modified
Tue, 07 Jan 2014 00:36:46 GMT
server
Apache
strict-transport-security
max-age=31536000
p3p
CP="NON DSP ADM DEV PSD OUR IND STP PHY PRE NAV UNI"
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-type
image/png
content-length
2681
expires
Sun, 15 Apr 2018 02:22:38 GMT
interior-gradient-top.png
www.paypalobjects.com/webstatic/mktg/consumer/gradients/
952 B
1 KB
Image
General
Full URL
https://www.paypalobjects.com/webstatic/mktg/consumer/gradients/interior-gradient-top.png
Requested by
Host: www.maannioda.com
URL: http://www.maannioda.com/graywbz/e4889f1c65681a3e30650ee4cf68ff8c-
Protocol
SPDY
Server
2.18.233.20 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
f2c173be6a198adf60868c86f6e093f3b850bef0da34689e981fe218ad2a43a1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://www.paypalobjects.com/eboxapps/css/f1/2098424bd3220ba2522b26543f3441/app.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/65.0.3325.181 Safari/537.36

Response headers

pragma
no-cache
date
Sun, 15 Apr 2018 02:22:38 GMT
x-content-type-options
nosniff
last-modified
Tue, 07 Jan 2014 00:43:12 GMT
server
Apache
strict-transport-security
max-age=31536000
p3p
CP="NON DSP ADM DEV PSD OUR IND STP PHY PRE NAV UNI"
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-type
image/png
content-length
952
expires
Sun, 15 Apr 2018 02:22:38 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
s17.postimg.org
URL
https://s17.postimg.org/dikobvhbz/logo_paypal_106x29.png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| submitIt

0 Cookies