Submitted URL: https://web10.z12.web.core.windows.net/
Effective URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4T...
Submission: On May 18 via manual from US

Summary

This website contacted 3 IPs in 3 countries across 2 domains to perform 11 HTTP transactions. The main IP is 52.168.171.67, located in Washington, United States and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is 52.168.171.67.
This is the only time 52.168.171.67 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 52.239.148.1 8075 (MICROSOFT...)
9 52.168.171.67 8075 (MICROSOFT...)
1 104.111.228.123 16625 (AKAMAI-AS)
11 3
Apex Domain
Subdomains
Transfer
1 paypalobjects.com
www.paypalobjects.com
2 KB
1 windows.net
web10.z12.web.core.windows.net
444 B
11 2
Domain Requested by
1 www.paypalobjects.com 52.168.171.67
1 web10.z12.web.core.windows.net
11 2

This site contains no links.

Subject Issuer Validity Valid
*.web.core.windows.net
Microsoft IT TLS CA 2
2020-04-17 -
2022-04-17
2 years crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2020-01-09 -
2022-01-12
2 years crt.sh

This page contains 1 frames:

Primary Page: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Frame ID: BCFA20A798B1AFADD780C0B327848ACB
Requests: 11 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://web10.z12.web.core.windows.net/ Page URL
  2. http://52.168.171.67/paypal/ Page URL
  3. http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRzi... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

11
Requests

18 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

3
Countries

115 kB
Transfer

405 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://web10.z12.web.core.windows.net/ Page URL
  2. http://52.168.171.67/paypal/ Page URL
  3. http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
web10.z12.web.core.windows.net/
75 B
444 B
Document
General
Full URL
https://web10.z12.web.core.windows.net/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.148.1 Seoul, Korea, Republic Of, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
b0dde7efc12c642b52fac4f0554b89bc901640ffdb377d60e99e8daa288aa707

Request headers

Host
web10.z12.web.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
75
Content-Type
text/html
Content-MD5
sp3viGFTtgKmvfbWaon/iA==
Last-Modified
Mon, 18 May 2020 20:10:27 GMT
Accept-Ranges
bytes
ETag
"0x8D7FB6781E1679F"
Server
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
2e4dac25-901e-0030-1a58-2d7e47000000
x-ms-version
2018-03-28
Date
Mon, 18 May 2020 21:09:10 GMT
Cookie set /
52.168.171.67/paypal/
205 B
619 B
Document
General
Full URL
http://52.168.171.67/paypal/
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
19aab528e399bcb9287042e1c5aab3744d8f531f33ebe55bc02c4aafce52b37b

Request headers

Host
52.168.171.67
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Server
Apache/2.4.29 (Ubuntu)
Set-Cookie
PHPSESSID=bcdj7b6ishp24uhafhtcjhoimh; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
199
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Primary Request Login.php
52.168.171.67/paypal/
5 KB
2 KB
Document
General
Full URL
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
1b98a819b5c9b006711706e09fc38262551a0e219f5a8cb02ce8b34c459c12ed

Request headers

Host
52.168.171.67
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://52.168.171.67/paypal/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=bcdj7b6ishp24uhafhtcjhoimh
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://52.168.171.67/paypal/

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Server
Apache/2.4.29 (Ubuntu)
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1820
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
jquery-1.9.1.js
52.168.171.67/paypal/assets/js/
262 KB
78 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery-1.9.1.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4185d-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
jquery.validate.min.js
52.168.171.67/paypal/assets/js/
21 KB
7 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery.validate.min.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8244de8a4015fa72470e8be9b4203dd6238883d2c5f6a46263521bb5da9e2d70

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"525b-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
6367
jquery.payment.js
52.168.171.67/paypal/assets/js/
18 KB
4 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery.payment.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
be95b37feb362dde4041a91a7768a45c97b0105af734ff67228cbfe03d951237

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4646-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3788
additional-methods.min.js
52.168.171.67/paypal/assets/js/
17 KB
5 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/additional-methods.min.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
393fa2ab0c3d90fb4c65d96eb9240ac527e3553a6c3b5bb4675a852f148c812d

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"42b1-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4915
jquery.maskedinput.js
52.168.171.67/paypal/assets/js/
10 KB
3 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/jquery.maskedinput.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e6ad5c12a1ad8a9ffcde1e1c2ee42a9590cee19c8e233094da4f117dd2641a7c

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"284e-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2647
Valid.UK.js
52.168.171.67/paypal/assets/js/
36 KB
6 KB
Script
General
Full URL
http://52.168.171.67/paypal/assets/js/Valid.UK.js
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7aefd97e32fa89f90ea7c14ce96f1a6b5bd68443d5d7e67c52114dd44f46fbd6

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9196-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Language
uk
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5, max=99
Content-Length
5788
app.css
52.168.171.67/paypal/assets/css/
32 KB
6 KB
Stylesheet
General
Full URL
http://52.168.171.67/paypal/assets/css/app.css
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
HTTP/1.1
Server
52.168.171.67 Washington, United States, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7822b5da5f2f1b760250f1d4d88971b07128255dd934516dd3f916acbfbac14f

Request headers

Referer
http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Mon, 18 May 2020 21:09:11 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7e08-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
5978
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: 52.168.171.67
URL: http://52.168.171.67/paypal/Login.php?sslchannel=true&sessionid=z0Q0poxH1VCtjF1HMZzkLJzMVHoEHxRziZxdYpFTTHNMXXL8R3X4TeUx6Jov5bIIJGx9RfzCNQMtPWvU
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.228.123 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-228-123.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://52.168.171.67/paypal/assets/css/app.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Mon, 18 May 2020 21:09:12 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-check-cacheable
YES
status
200
vary
Accept-Encoding
content-length
1929
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
x-serial
16973
strict-transport-security
max-age=31536000
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=3600
accept-ranges
bytes
expires
Mon, 18 May 2020 22:09:12 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| validateForm function| removeEmailError function| removeEmailErrorFocus function| removePasswordError function| removePasswordErrorFocus object| jQuery19105507070055062591

1 Cookies

Domain/Path Name / Value
52.168.171.67/ Name: PHPSESSID
Value: bcdj7b6ishp24uhafhtcjhoimh