www.paypay-bakn.com
Open in
urlscan Pro
52.194.231.46
Malicious Activity!
Public Scan
Submission: On July 28 via api from JP
Summary
This is the only time www.paypay-bakn.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPay (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 17 | 52.194.231.46 52.194.231.46 | 16509 (AMAZON-02) (AMAZON-02) | |
14 | 1 |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-194-231-46.ap-northeast-1.compute.amazonaws.com
www.paypay-bakn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
17 |
paypay-bakn.com
3 redirects
www.paypay-bakn.com |
310 KB |
14 | 1 |
Domain | Requested by | |
---|---|---|
17 | www.paypay-bakn.com |
3 redirects
www.paypay-bakn.com
|
14 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypay-bakn.com R3 |
2021-07-28 - 2021-10-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.paypay-bakn.com/client/index.html
Frame ID: 3D52F8C2639A2D30F112EDD56164C502
Requests: 14 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- script /(?:\/([\d.]+))?\/vue(?:\.min)?\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.paypay-bakn.com/css/index.css HTTP 301
- https://www.paypay-bakn.com/css/index.css
- http://www.paypay-bakn.com/js/vue.js HTTP 301
- https://www.paypay-bakn.com/js/vue.js
- http://www.paypay-bakn.com/js/index.js HTTP 301
- https://www.paypay-bakn.com/js/index.js
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.html
www.paypay-bakn.com/client/ |
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.css
www.paypay-bakn.com/css/ Redirect Chain
|
7 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer_logo.png
www.paypay-bakn.com/img/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login_infotip%20(1).png
www.paypay-bakn.com/img/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login_cash_card%20(1).png
www.paypay-bakn.com/img/ |
101 KB 101 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main_logo.png
www.paypay-bakn.com/img/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vue.js
www.paypay-bakn.com/js/ Redirect Chain
|
334 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.5.1.js
www.paypay-bakn.com/js/ |
281 KB 83 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.js
www.paypay-bakn.com/js/ Redirect Chain
|
2 KB 998 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header_faq.png
www.paypay-bakn.com/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
link_win_open1.gif
www.paypay-bakn.com/img/ |
67 B 315 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
icon_caution.gif
www.paypay-bakn.com/img/ |
325 B 575 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
XIANGXIA.png
www.paypay-bakn.com/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
xiangyou.png
www.paypay-bakn.com/img/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPay (Financial)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| Vue function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.paypay-bakn.com
52.194.231.46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