www.denimsandjeans.com
Open in
urlscan Pro
142.4.16.185
Malicious Activity!
Public Scan
Submission Tags: @ipnigh
Submission: On February 29 via api from GB
Summary
This is the only time www.denimsandjeans.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial) Suspicious (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 142.4.16.185 142.4.16.185 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 152.199.19.160 152.199.19.160 | 15133 (EDGECAST) (EDGECAST) | |
3 | 2.18.232.75 2.18.232.75 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
13 | 5 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: server.denimsandjeans.com
www.denimsandjeans.com |
ASN16625 (AKAMAI-AS, US)
PTR: a2-18-232-75.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
denimsandjeans.com
www.denimsandjeans.com |
111 KB |
3 |
paypalobjects.com
www.paypalobjects.com |
6 KB |
1 |
microsoft.com
ajax.microsoft.com |
4 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
10 KB |
1 |
jquery.com
code.jquery.com |
29 KB |
13 | 5 |
Domain | Requested by | |
---|---|---|
7 | www.denimsandjeans.com |
www.denimsandjeans.com
|
3 | www.paypalobjects.com |
www.denimsandjeans.com
|
1 | ajax.microsoft.com |
www.denimsandjeans.com
|
1 | maxcdn.bootstrapcdn.com |
www.denimsandjeans.com
|
1 | code.jquery.com |
www.denimsandjeans.com
|
13 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.denimsandjeans.com/auth/signin/card/?data=confirm&execution=3ceaa33ffc6a48a676bfe4da8f4eea2f
Frame ID: B501BEE036CBB4E2CDD329BE03B071EC
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.denimsandjeans.com/auth/signin/card/ |
10 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
www.denimsandjeans.com/auth/signin/css/ |
24 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-2.1.4.min.js
code.jquery.com/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.payment.js
www.denimsandjeans.com/auth/signin/js/ |
17 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.maskedinput.min.js
www.denimsandjeans.com/auth/signin/js/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
additional-methods.js
ajax.microsoft.com/ajax/jquery.validate/1.7/ |
11 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
scr_content-bkgd.png
www.paypalobjects.com/webstatic/i/ex_ce2/scr/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
interior-gradient-top.png
www.paypalobjects.com/webstatic/mktg/consumer/gradients/ |
952 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprites_cc_global.png
www.denimsandjeans.com/auth/signin/css/img/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
url.png
www.denimsandjeans.com/auth/signin/css/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
card.png
www.denimsandjeans.com/auth/signin/css/img/ |
21 KB 21 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial) Suspicious (Online)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.microsoft.com
code.jquery.com
maxcdn.bootstrapcdn.com
www.denimsandjeans.com
www.paypalobjects.com
142.4.16.185
152.199.19.160
2.18.232.75
2001:4de0:ac19::1:b:1a
2001:4de0:ac19::1:b:2b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