paypal.co.uk.6dqv.icu Open in urlscan Pro
45.139.186.104  Malicious Activity! Public Scan

URL: https://paypal.co.uk.6dqv.icu/p/login.php
Submission: On January 25 via automatic, source phishtank

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 5 HTTP transactions. The main IP is 45.139.186.104, located in Russian Federation and belongs to Hosting vpsville.ru, RU. The main domain is paypal.co.uk.6dqv.icu.
TLS certificate: Issued by Let's Encrypt Authority X3 on January 23rd 2020. Valid for: 3 months.
This is the only time paypal.co.uk.6dqv.icu was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PNC Financial (Banking)

Domain & IP information

IP Address AS Autonomous System
5 45.139.186.104 59504 (Hosting v...)
5 1
Apex Domain
Subdomains
Transfer
5 6dqv.icu
paypal.co.uk.6dqv.icu
19 KB
5 1
Domain Requested by
5 paypal.co.uk.6dqv.icu paypal.co.uk.6dqv.icu
5 1

This site contains no links.

Subject Issuer Validity Valid
paypal.co.uk.6dqv.icu
Let's Encrypt Authority X3
2020-01-23 -
2020-04-22
3 months crt.sh

This page contains 1 frames:

Primary Page: https://paypal.co.uk.6dqv.icu/p/login.php
Frame ID: 65A3413AF379BAEDE880AA03DDEDD288
Requests: 5 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • url /\.php(?:$|\?)/i

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Page Statistics

5
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

19 kB
Transfer

25 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
paypal.co.uk.6dqv.icu/p/
14 KB
8 KB
Document
General
Full URL
https://paypal.co.uk.6dqv.icu/p/login.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.139.186.104 , Russian Federation, ASN59504 (Hosting vpsville.ru, RU),
Reverse DNS
20689.vdsid.ru
Software
nginx /
Resource Hash
ce9a234e9cfaf8877bf2da3351f2ec45f7cc79d3b48888aa88b39c801c12b512

Request headers

Host
paypal.co.uk.6dqv.icu
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

Server
nginx
Date
Sat, 25 Jan 2020 10:45:45 GMT
Content-Type
text/html; charset=UTF-8
Content-Length
7885
Connection
keep-alive
Vary
Accept-Encoding
Content-Encoding
gzip
header_lg.jpg
paypal.co.uk.6dqv.icu/p/
5 KB
5 KB
Image
General
Full URL
https://paypal.co.uk.6dqv.icu/p/header_lg.jpg
Requested by
Host: paypal.co.uk.6dqv.icu
URL: https://paypal.co.uk.6dqv.icu/p/login.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.139.186.104 , Russian Federation, ASN59504 (Hosting vpsville.ru, RU),
Reverse DNS
20689.vdsid.ru
Software
nginx /
Resource Hash
acbf87594a100fec775f07670ca078830124b9c7cd60846b467ef1e20567e962

Request headers

Referer
https://paypal.co.uk.6dqv.icu/p/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 25 Jan 2020 10:45:45 GMT
Last-Modified
Sat, 06 Oct 2018 18:59:46 GMT
Server
nginx
ETag
"1491-57793fdd44c80"
Content-Type
image/jpeg
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
5265
button_locatePNC.png
paypal.co.uk.6dqv.icu/p/
2 KB
2 KB
Image
General
Full URL
https://paypal.co.uk.6dqv.icu/p/button_locatePNC.png
Requested by
Host: paypal.co.uk.6dqv.icu
URL: https://paypal.co.uk.6dqv.icu/p/login.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.139.186.104 , Russian Federation, ASN59504 (Hosting vpsville.ru, RU),
Reverse DNS
20689.vdsid.ru
Software
nginx /
Resource Hash
4690e4f3f5aca58d5ad6805da5fc3d395ba5f7a418d57ef060c01c25453cab52

Request headers

Referer
https://paypal.co.uk.6dqv.icu/p/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 25 Jan 2020 10:45:45 GMT
Last-Modified
Sat, 06 Oct 2018 18:59:50 GMT
Server
nginx
ETag
"696-57793fe115580"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1686
button_aboutPNCmobile.png
paypal.co.uk.6dqv.icu/p/
2 KB
2 KB
Image
General
Full URL
https://paypal.co.uk.6dqv.icu/p/button_aboutPNCmobile.png
Requested by
Host: paypal.co.uk.6dqv.icu
URL: https://paypal.co.uk.6dqv.icu/p/login.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.139.186.104 , Russian Federation, ASN59504 (Hosting vpsville.ru, RU),
Reverse DNS
20689.vdsid.ru
Software
nginx /
Resource Hash
6c6c24e8fa7714f42fdaf29daa5977cf485523473fd54bce763a14b5b1a2d5c3

Request headers

Referer
https://paypal.co.uk.6dqv.icu/p/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 25 Jan 2020 10:45:45 GMT
Last-Modified
Sat, 06 Oct 2018 18:59:50 GMT
Server
nginx
ETag
"84c-57793fe115580"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
2124
button_signOn.png
paypal.co.uk.6dqv.icu/p/
2 KB
2 KB
Image
General
Full URL
https://paypal.co.uk.6dqv.icu/p/button_signOn.png
Requested by
Host: paypal.co.uk.6dqv.icu
URL: https://paypal.co.uk.6dqv.icu/p/login.php
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
45.139.186.104 , Russian Federation, ASN59504 (Hosting vpsville.ru, RU),
Reverse DNS
20689.vdsid.ru
Software
nginx /
Resource Hash
90b8f5f31e649aee7ee98455c6f06ec95ee14ca5f5faa8a86308ae40a9f1cf3c

Request headers

Referer
https://paypal.co.uk.6dqv.icu/p/login.php
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

Date
Sat, 25 Jan 2020 10:45:45 GMT
Last-Modified
Sat, 06 Oct 2018 18:59:50 GMT
Server
nginx
ETag
"630-57793fe115580"
Content-Type
image/png
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1584

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PNC Financial (Banking)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate object| Aes object| Base64 object| Utf8 string| hea2p string| hea2t string| output string| ctrTxt

0 Cookies