sportszania.com
Open in
urlscan Pro
115.124.124.204
Malicious Activity!
Public Scan
Submission: On August 07 via automatic, source phishtank
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 21st 2018. Valid for: 3 months.
This is the only time sportszania.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 115.124.124.204 115.124.124.204 | 45815 (HOSTCOIN-...) (HOSTCOIN-AS-IN-AP ESDS Software Solution Pvt. Ltd.) | |
9 | 1 |
ASN45815 (HOSTCOIN-AS-IN-AP ESDS Software Solution Pvt. Ltd., IN)
PTR: server.sundeep.biz
sportszania.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
sportszania.com
1 redirects
sportszania.com |
93 KB |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | sportszania.com |
1 redirects
sportszania.com
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sportszania.com cPanel, Inc. Certification Authority |
2018-07-21 - 2018-10-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://sportszania.com/Paypal/Paypal%20Security/
Frame ID: B7386A2772BC6BAB9FEC1A516BABB94F
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://sportszania.com/Paypal/Paypal%20Security
HTTP 301
https://sportszania.com/Paypal/Paypal%20Security/ Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
UNIX (Operating Systems) Expand
Detected patterns
- headers server /Unix/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_ssl (Web Server Extensions) Expand
Detected patterns
- headers server /mod_ssl(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
- headers server /mod_ssl(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://sportszania.com/Paypal/Paypal%20Security
HTTP 301
https://sportszania.com/Paypal/Paypal%20Security/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
sportszania.com/Paypal/Paypal%20Security/ Redirect Chain
|
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
sportszania.com/Paypal/Paypal%20Security/css/ |
55 KB 55 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.gif
sportszania.com/Paypal/Paypal%20Security/img/ |
2 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login-footer.png
sportszania.com/Paypal/Paypal%20Security/img/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aio.png
sportszania.com/Paypal/Paypal%20Security/img/ |
9 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
forgetlogin.png
sportszania.com/Paypal/Paypal%20Security/img/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
passlogin.png
sportszania.com/Paypal/Paypal%20Security/img/ |
620 B 973 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
emailadr.png
sportszania.com/Paypal/Paypal%20Security/img/ |
670 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logintoyouraccount.png
sportszania.com/Paypal/Paypal%20Security/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sportszania.com
115.124.124.204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