globalteleshop.com Open in urlscan Pro
202.70.138.65  Malicious Activity! Public Scan

URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Submission Tags: phishing malicious Search All
Submission: On August 31 via api from US

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 8 HTTP transactions. The main IP is 202.70.138.65, located in Indonesia and belongs to TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID. The main domain is globalteleshop.com.
This is the only time globalteleshop.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
6 202.70.138.65 46035 (TRIKOMSEL...)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 23.59.68.53 16625 (AKAMAI-AS)
8 3
Domain Requested by
6 globalteleshop.com globalteleshop.com
1 www.paypalobjects.com globalteleshop.com
1 cdnjs.cloudflare.com globalteleshop.com
8 3

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-10-21 -
2021-10-20
a year crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2021-07-08 -
2022-01-11
6 months crt.sh

This page contains 1 frames:

Primary Page: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Frame ID: 4700CC861A98C370B79C3C296947063A
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

Log in to your PayPal account

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /require.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

8
Requests

25 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

478 kB
Transfer

672 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
3 KB
4 KB
Document
General
Full URL
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
HTTP/1.1
Server
202.70.138.65 , Indonesia, ASN46035 (TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID),
Reverse DNS
65-subnet-138-70-202.oke.com
Software
nginx/1.21.1 /
Resource Hash
d0ed56c6e6a145bc318cc14fb632a3f01acb9cf18dfa5444fec3b5a207d08746

Request headers

Host
globalteleshop.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Server
nginx/1.21.1
Date
Tue, 31 Aug 2021 04:24:08 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
Set-Cookie
PHPSESSID=le3kmh5mne85tc1dgc31c83ac5; path=/
app.css
globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/
38 KB
38 KB
Stylesheet
General
Full URL
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/app.css
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
HTTP/1.1
Server
202.70.138.65 , Indonesia, ASN46035 (TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID),
Reverse DNS
65-subnet-138-70-202.oke.com
Software
nginx/1.21.1 /
Resource Hash
c8c0595b709d3b91af6b173aa2f7027eee3fb617bd45d94ad61654f45564d4c6

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
globalteleshop.com
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Cookie
PHPSESSID=le3kmh5mne85tc1dgc31c83ac5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 31 Aug 2021 04:24:08 GMT
Last-Modified
Thu, 27 Sep 2018 19:56:11 GMT
Server
nginx/1.21.1
ETag
"400f58-9634-576dfbb113d09"
Vary
Accept-Encoding,User-Agent
Content-Type
text/css
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
38452
jquery.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/
258 KB
64 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/jquery/3.1.0/jquery.js
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:125e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b25a2092f0752b754e933008f10213c55dd5ce93a791e355b0abed9182cc8df9
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

Referer
http://globalteleshop.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Tue, 31 Aug 2021 04:20:12 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
age
2872102
cross-origin-resource-policy
cross-origin
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
content-length
65128
timing-allow-origin
*
last-modified
Mon, 04 May 2020 16:11:48 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03ec4-40657"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=QjH8n5ISz2ToLfehT9BPaOKL%2FusCASPt1hUpLnm2Sei9xtyujogx%2FjZaawtAi4jv16f90SsmbDtobbq%2BR2T%2FWMc%2FS30TuOtz2Ltscu68kr5NnREeBFr0evKGZMj5IPMe6dm60IGc97KK0i21ZhnDZOPo"}],"group":"cf-nel","max_age":604800}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=30672000
accept-ranges
bytes
cf-ray
6873770bdb8c435d-FRA
expires
Sun, 21 Aug 2022 04:20:12 GMT
signin.js
globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/
1 KB
1 KB
Script
General
Full URL
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/signin.js
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
HTTP/1.1
Server
202.70.138.65 , Indonesia, ASN46035 (TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID),
Reverse DNS
65-subnet-138-70-202.oke.com
Software
nginx/1.21.1 /
Resource Hash
bce5af51a37543cd46614e90db944fbce529806f0a22c786e3454da7131c782b

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
globalteleshop.com
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
*/*
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Cookie
PHPSESSID=le3kmh5mne85tc1dgc31c83ac5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 31 Aug 2021 04:24:08 GMT
Last-Modified
Thu, 27 Sep 2018 19:56:11 GMT
Server
nginx/1.21.1
ETag
"400f54-40a-576dfbb113921"
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
1034
require.js
globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/
15 KB
15 KB
Script
General
Full URL
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/require.js
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
HTTP/1.1
Server
202.70.138.65 , Indonesia, ASN46035 (TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID),
Reverse DNS
65-subnet-138-70-202.oke.com
Software
nginx/1.21.1 /
Resource Hash
c007d73792ac2d25882bfbb573e700e721a0adacfab947e6a0b64a61991fecf0

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
globalteleshop.com
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
*/*
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Cookie
PHPSESSID=le3kmh5mne85tc1dgc31c83ac5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 31 Aug 2021 04:24:09 GMT
Last-Modified
Thu, 27 Sep 2018 19:56:11 GMT
Server
nginx/1.21.1
ETag
"400f56-3a06-576dfbb113d09"
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
14854
app.js
globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/
280 KB
280 KB
Script
General
Full URL
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/app.js
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
HTTP/1.1
Server
202.70.138.65 , Indonesia, ASN46035 (TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID),
Reverse DNS
65-subnet-138-70-202.oke.com
Software
nginx/1.21.1 /
Resource Hash
c40e34e89fa3460b8743f0b24c6f732d3c795062f90f0865be0f763536f4f232

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
globalteleshop.com
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
*/*
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Cookie
PHPSESSID=le3kmh5mne85tc1dgc31c83ac5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 31 Aug 2021 04:24:09 GMT
Last-Modified
Thu, 27 Sep 2018 19:56:11 GMT
Server
nginx/1.21.1
ETag
"400f59-45efc-576dfbb1140f1"
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
286460
pa.js
globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/
74 KB
74 KB
Script
General
Full URL
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/pa.js
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Protocol
HTTP/1.1
Server
202.70.138.65 , Indonesia, ASN46035 (TRIKOMSEL-AS-ID PT Trikomsel Oke Tbk, ID),
Reverse DNS
65-subnet-138-70-202.oke.com
Software
nginx/1.21.1 /
Resource Hash
99878852a92bc88fbe1201084bbeb53326c1f4bf42d61e57889beb3889fb7e13

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
globalteleshop.com
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36
Accept
*/*
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
Cookie
PHPSESSID=le3kmh5mne85tc1dgc31c83ac5
Connection
keep-alive
Cache-Control
no-cache
Referer
http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/signin/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

Date
Tue, 31 Aug 2021 04:24:09 GMT
Last-Modified
Thu, 27 Sep 2018 19:56:11 GMT
Server
nginx/1.21.1
ETag
"400f57-1266f-576dfbb113d09"
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
75375
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: globalteleshop.com
URL: http://globalteleshop.com/system/fonts/Paypal-verify/users/userID-49727/lib/app.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
23.59.68.53 Munich, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a23-59-68-53.deploy.static.akamaitechnologies.com
Software
/
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://globalteleshop.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/92.0.4515.159 Safari/537.36

Response headers

date
Tue, 31 Aug 2021 04:20:13 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
cache-control
public, max-age=3600
etag
W/"544ad849-1351"
surrogate-control
max-age=31536000
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
paypal-debug-id
67a6d6d32ed42
strict-transport-security
max-age=31536000
dc
slc-b-origin-www-1.paypal.com
content-length
1932
expires
Tue, 31 Aug 2021 05:20:13 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

21 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| _0xce15 function| require function| requirejs function| define function| extend object| dust function| _ object| Backbone object| PAYPAL object| fpti string| fptiserverurl object| jQuery18000640786905105899

1 Cookies

Domain/Path Name / Value
globalteleshop.com/ Name: PHPSESSID
Value: le3kmh5mne85tc1dgc31c83ac5