paypal-secure-dashboard.moonkahonda.com
Open in
urlscan Pro
192.163.245.86
Malicious Activity!
Public Scan
Submission: On January 08 via manual from JP
Summary
This is the only time paypal-secure-dashboard.moonkahonda.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 8 | 192.163.245.86 192.163.245.86 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1 - Unified Layer) | |
7 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1 - Unified Layer, US)
PTR: host.anmoul.net.in
paypal-secure-dashboard.moonkahonda.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
moonkahonda.com
1 redirects
paypal-secure-dashboard.moonkahonda.com |
120 KB |
7 | 1 |
Domain | Requested by | |
---|---|---|
8 | paypal-secure-dashboard.moonkahonda.com |
1 redirects
paypal-secure-dashboard.moonkahonda.com
|
7 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/
Frame ID: 7FD6B16C16CA6289C5AB020668E2CF8E
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl
HTTP 301
http://paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/ Page URL
Detected technologies
UNIX (Operating Systems) ExpandDetected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_dav (Web Server Extensions) Expand
Detected patterns
- headers server /\b(?:mod_)?DAV\b(?:\/([\d.]+))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
- headers server /\b(?:mod_)?DAV\b(?:\/([\d.]+))?/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl
HTTP 301
http://paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/ Redirect Chain
|
6 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xppl-Login.css
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/x-css/ |
53 KB 54 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
erur.js
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/x-js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
min.js
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/x-js/ |
44 KB 44 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xppl-logo.svg
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/x-images/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4087623368
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/ |
531 B 784 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
paypal-secure-dashboard.moonkahonda.com/Dashboard__JP/jp/xppl/ |
6 KB 7 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| xpp object| PAYPAL function| $1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
paypal-secure-dashboard.moonkahonda.com/ | Name: PHPSESSID Value: 9e641272b08a0b39d420470e1c8582ac |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paypal-secure-dashboard.moonkahonda.com
192.163.245.86
12aeb8008fbb7618b1a715563aefc9e5a76380510498cb3ed3f99634342d4b4f
b3e42c18bed28b498e74da5cdcc33a8e677e3131fe95ef065ce548a025698f9b
c6ec2b87408a9703a69fc982b2d63af8cd16b3ad76f5c85c23eba5ba9c8bc510
c94ea6b14cb19f8bd95b0278bbfe79855cdf2a79487a91bf615b0583fad0bc13
da7690bd993ff6433b42dc44725e384edefbff67a5f0b8c320e6ddb162cdd12a
e7732075c1658de8aa753e0eee55aaaa03d3bd2d4cb59cf77ee5ecbf52977ae2
e931105f32bd8f02c787b2612a15ec7aef4a138e6271c1dbd060e39a63a7b29a