avaya-ip.com
Open in
urlscan Pro
213.60.244.38
Malicious Activity!
Public Scan
Effective URL: http://avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e8615...
Submission: On January 04 via manual from US
Summary
This is the only time avaya-ip.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 198.23.58.17 198.23.58.17 | 32748 (STEADFAST) (STEADFAST - Steadfast) | |
1 10 | 213.60.244.38 213.60.244.38 | 12334 (Galicia) (Galicia - Spain) | |
1 2 | 172.82.228.16 172.82.228.16 | 15224 (OMNITURE) (OMNITURE - Adobe Systems Inc.) | |
3 | 23.210.248.226 23.210.248.226 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 2 | 176.120.18.70 176.120.18.70 | 198911 (BML-AS) (BML-AS) | |
14 | 4 |
ASN32748 (STEADFAST - Steadfast, US)
PTR: 123internet.com.au
affinitysoftware.com.au |
ASN12334 (Galicia - Spain, ES)
PTR: int-static-244-38.ptg.es
avaya-ip.com |
ASN15224 (OMNITURE - Adobe Systems Inc., US)
PTR: *.d1.sc.omtrdc.net
paypal.d1.sc.omtrdc.net |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a23-210-248-226.deploy.static.akamaitechnologies.com
www.paypalobjects.com | |
c.paypal.com | |
t.paypal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
avaya-ip.com
1 redirects
avaya-ip.com |
147 KB |
4 |
paypal.com
1 redirects
b.stats.paypal.com dub.stats.paypal.com c.paypal.com t.paypal.com |
2 KB |
2 |
omtrdc.net
1 redirects
paypal.d1.sc.omtrdc.net |
2 KB |
1 |
paypalobjects.com
www.paypalobjects.com |
18 KB |
1 |
affinitysoftware.com.au
1 redirects
affinitysoftware.com.au |
343 B |
14 | 5 |
Domain | Requested by | |
---|---|---|
10 | avaya-ip.com |
1 redirects
avaya-ip.com
|
2 | paypal.d1.sc.omtrdc.net | 1 redirects |
1 | t.paypal.com | |
1 | c.paypal.com |
www.paypalobjects.com
|
1 | dub.stats.paypal.com | |
1 | b.stats.paypal.com | 1 redirects |
1 | www.paypalobjects.com |
avaya-ip.com
|
1 | affinitysoftware.com.au | 1 redirects |
14 | 8 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paypal.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2018-08-14 - 2020-08-18 |
2 years | crt.sh |
b.stats.paypal.com DigiCert SHA2 High Assurance Server CA |
2018-02-16 - 2020-04-29 |
2 years | crt.sh |
This page contains 3 frames:
Primary Page:
http://avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index.htm
Frame ID: 4662AC29900A31E1DF6D6E1D7F5E65D8
Requests: 12 HTTP requests in this frame
Frame:
https://dub.stats.paypal.com/counter2.cgi
Frame ID: 0BE246851183C22A5BBACDBB07D5DDF8
Requests: 1 HTTP requests in this frame
Frame:
https://c.paypal.com/v1/r/d/i?js_src=https://www.paypalobjects.com/webstatic/r/fb/fb-all-prod.pp.min.js
Frame ID: 7F6628DD429E2B697268743089C596A9
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://affinitysoftware.com.au/cli/
HTTP 302
http://avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/ HTTP 302
http://avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420... Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Backbone.js (JavaScript Frameworks) Expand
Detected patterns
- env /^Backbone$/i
PayPal (Payment Processors) Expand
Detected patterns
- env /^PAYPAL$/i
RequireJS (JavaScript Frameworks) Expand
Detected patterns
- script /require.*\.js/i
- env /^requirejs$/i
Modernizr (JavaScript Libraries) Expand
Detected patterns
- env /^Modernizr$/i
SiteCatalyst (Analytics) Expand
Detected patterns
- env /^s_(?:account|objectID|code|INST)$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Underscore.js (JavaScript Libraries) Expand
Detected patterns
- env /^Backbone$/i
Page Statistics
4 Outgoing links
These are links going to different origins than the main page.
Title: Hai dimenticato l'indirizzo email o la password?
Search URL Search Domain Scan URL
Title: Registrati
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Title: PayPal
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://affinitysoftware.com.au/cli/
HTTP 302
http://avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/ HTTP 302
http://avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 8- http://paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/s45375062606188?AQB=1&ndh=1&t=4%2F0%2F2019%2014%3A38%3A11%205%200&fid=6E9DB0EF506DE3D2-3B4DD4D647205647&vmt=51437A79&vmf=paypal.112.2o7.net&ce=UTF-8&ns=paypal&pageName=main%3Aunifiedlogin%3A%3A%3Alogin&g=http%3A%2F%2Favaya-ip.com%2Fcms%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2Ff2d931f7420839f982c8d09253e86151%2Findex.htm&cc=USD&c1=unifiedloginnodeweb%2Fpublic%2Ftemplates%2Flogin.dust&c7=none&v7=none%3Anone%3Anone&c8=none&c9=none&c17=Accedi%20al%20tuo%20conto%20PayPal&c19=main%3Aunifiedlogin%3A%3A%3Alogin&v19=D%3Dc7&c20=1451569828735&c25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v31=main%3Aunifiedlogin%3A%3A%3Alogin&c35=%3A%3A&c36=avaya-ip.com%2Fcms%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2Ff2d931f7420839f982c8d09253e86151%2Findex.htm&c37=unifiedlogin&c39=D%3DpageName&c40=64e41cd9b05be&c47=D%3DpageName&c50=it_it&c53=h.25.3%7C01.17.2013&c71=Nodejs&c72=UTF-8&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1 HTTP 302
- http://paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/s45375062606188?AQB=1&pccr=true&vidn=2E17B7E985317161-60000117C0054D50&&ndh=1&t=4%2F0%2F2019%2014%3A38%3A11%205%200&fid=6E9DB0EF506DE3D2-3B4DD4D647205647&vmt=51437A79&vmf=paypal.112.2o7.net&ce=UTF-8&ns=paypal&pageName=main%3Aunifiedlogin%3A%3A%3Alogin&g=http%3A%2F%2Favaya-ip.com%2Fcms%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2Ff2d931f7420839f982c8d09253e86151%2Findex.htm&cc=USD&c1=unifiedloginnodeweb%2Fpublic%2Ftemplates%2Flogin.dust&c7=none&v7=none%3Anone%3Anone&c8=none&c9=none&c17=Accedi%20al%20tuo%20conto%20PayPal&c19=main%3Aunifiedlogin%3A%3A%3Alogin&v19=D%3Dc7&c20=1451569828735&c25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v25=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&v31=main%3Aunifiedlogin%3A%3A%3Alogin&c35=%3A%3A&c36=avaya-ip.com%2Fcms%2Fit%2Fwebstaticmktg2014designfontPP%2FSansPayPalSansBig-Bold.woff%2Ff2d931f7420839f982c8d09253e86151%2Findex.htm&c37=unifiedlogin&c39=D%3DpageName&c40=64e41cd9b05be&c47=D%3DpageName&c50=it_it&c53=h.25.3%7C01.17.2013&c71=Nodejs&c72=UTF-8&s=1600x1200&c=24&j=1.6&v=N&k=Y&bw=1600&bh=1200&AQE=1
- https://b.stats.paypal.com/v1/counter.cgi?r=cD0wMDFhZGYxYTMxY2M0MGRmODBiOTI3ZWViZjhmNTEyYiZpPTQxLjE0MC4xODUuMTA2JnQ9MTQ1MTU2OTgyOC43NjMmYT0yMSZzPVVOSUZJRURfTE9HSU7ViQMy2ebOtnjy2F_FAplaWaqwdw HTTP 302
- https://dub.stats.paypal.com/counter2.cgi
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.htm
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/ Redirect Chain
|
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app00000.css
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
37 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
moderniz.js
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
challeng.htm
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
3 KB 1 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
require0.js
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
15 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app00000.js
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
288 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pp_jscod.js
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
60 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pa000000.js
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
66 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
paypal-l.svg
avaya-ip.com/cms/it/webstaticmktg2014designfontPP/SansPayPalSansBig-Bold.woff/f2d931f7420839f982c8d09253e86151/index_files/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
s45375062606188
paypal.d1.sc.omtrdc.net/b/ss/paypalglobal/1/H.25.3/ Redirect Chain
|
43 B 728 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fb-all-prod.pp.min.js
www.paypalobjects.com/webstatic/r/fb/ |
57 KB 18 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
counter2.cgi
dub.stats.paypal.com/ Frame 0BE2 Redirect Chain
|
42 B 494 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
i
c.paypal.com/v1/r/d/ Frame 7F66 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ts
t.paypal.com/ |
42 B 471 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)60 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask object| html5 object| Modernizr object| antiClickjack function| require function| requirejs function| define function| getGlobal object| dust function| extend function| $ function| jQuery function| _ object| Backbone string| sc_code_ver string| s_account object| s function| s_doPlugins string| s_code string| s_objectID function| s_gi function| s_giqf string| s_an function| s_sp function| s_jn function| s_rep function| s_d function| s_fe function| s_fa function| s_ft object| s_c_il number| s_c_in number| s_giq function| scOnload object| PAYPAL object| fpti string| fptiserverurl string| j object| s_i_paypal object| jQuery18008813173890278294 boolean| webkit function| AjaxRequest string| PP_SERVICE_URL string| BASE_SWF_URL string| BEACON_BASE_URL string| PP_IFRAME_JS_URL string| PP_NEW_SERVICE_URL string| PP_VERSION object| Configuration object| PFB_4732Config object| PFB_4732 object| dataCollector object| fp undefined| runFb function| initTsFb object| jstz function| SwfStore function| SlvtStore2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.avaya-ip.com/ | Name: s_sess Value: %20s_ppv%3D100%3B%20s_cc%3Dtrue%3B%20v31%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%3B%20s_sq%3D%3B |
|
.avaya-ip.com/ | Name: s_pers Value: %20s_fid%3D6E9DB0EF506DE3D2-3B4DD4D647205647%7C1609771091250%3B%20gpv_c43%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1546614491252%3B%20tr_p1%3Dmain%253Aunifiedlogin%253A%253A%253Alogin%7C1546614491254%3B%20gpv_events%3Dno%2520value%7C1546614491254%3B |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
affinitysoftware.com.au
avaya-ip.com
b.stats.paypal.com
c.paypal.com
dub.stats.paypal.com
paypal.d1.sc.omtrdc.net
t.paypal.com
www.paypalobjects.com
172.82.228.16
176.120.18.70
198.23.58.17
213.60.244.38
23.210.248.226
1bbc33774d6bb79a9ae441cd68bd8fb206547f84f0414e16ee828c353464066b
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
7498ba2b2b40e97bd13943950d02e99028e7070bf03f449aff59e4ddd11c4edb
892f53f60e64e4a92ba2d0b9d7c4ecd62edc18cbb747e41b6de495dcad842680
8a7a184fa25022c4b6c9aea1e345fb9049f44bd1c94bd9527b0bc81d7ab12bda
8dd28e021f1c4f6be67e1f58a7c5123caaee2ddb6fc18603cc2f4561b9ccea59
98ecaad59fce14516bd1c79d6361e1f798a6cf3d077b68b5807adc153c5fb389
9bbf1ce51d9751054757ff383e410a379a4b1ee26527334f4add83fbfba1d36c
a1ecbaed793a1f564c49c671f2dd0ce36f858534ef6d26b55783a06b884cc506
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0
eb16d80daecb92f5a56606ad94672c3a8aebb683319084407c36b181754aeb83