188.247.134.135 Open in urlscan Pro
188.247.134.135  Malicious Activity! Public Scan

URL: http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
Submission: On June 23 via automatic, source phishtank

Summary

This website contacted 2 IPs in 2 countries across 1 domains to perform 5 HTTP transactions. The main IP is 188.247.134.135, located in Bucharest, Romania and belongs to ASSECO-NET, RO. The main domain is 188.247.134.135.
This is the only time 188.247.134.135 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
4 188.247.134.135 198099 (ASSECO-NET)
1 198.232.125.113 3257 (GTT-BACKB...)
5 2
Apex Domain
Subdomains
Transfer
1 jquery.com
code.jquery.com
38 KB
5 1
Domain Requested by
1 code.jquery.com 188.247.134.135
5 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
Frame ID: 26259.1
Requests: 5 HTTP requests in this frame

Screenshot


Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

2
Countries

73 kB
Transfer

128 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request websc-login.php
188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/
1 KB
1 KB
Document
General
Full URL
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) / PHP/5.2.10
Resource Hash
4349e466c4e8a7c71faa2d82d48ceead745bef6c3d382c3e871e8a3ead9cc744

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Fri, 23 Jun 2017 20:44:03 GMT
Server
Apache/2.2.8 (CentOS)
Connection
close
X-Powered-By
PHP/5.2.10
Content-Length
1077
Content-Type
text/html; charset=UTF-8
main.css
188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/
2 KB
2 KB
Stylesheet
General
Full URL
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/main.css
Requested by
Host: 188.247.134.135
URL: http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) /
Resource Hash
1d9ca1fb34f6343ef6a7fe8ab6ba2f531749bcd79c3bc63de5ae0bd8667b93ed

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Fri, 23 Jun 2017 20:44:03 GMT
Last-Modified
Thu, 22 Jun 2017 15:18:10 GMT
Server
Apache/2.2.8 (CentOS)
ETag
"11a99c-79e-5528dfe11d080"
Content-Type
text/css
Connection
close
Accept-Ranges
bytes
Content-Length
1950
jquery.min.js
code.jquery.com/
94 KB
38 KB
Script
General
Full URL
http://code.jquery.com/jquery.min.js
Requested by
Host: 188.247.134.135
URL: http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
Protocol
HTTP/1.1
Server
198.232.125.113 Los Angeles, United States, ASN3257 (GTT-BACKBONE GTT, DE),
Reverse DNS
113-125-232-198.static.unitasglobal.net
Software
NetDNA-cache/2.2 /
Resource Hash
4b940065e2a67c37e3bd02b23c651f4744a3c219aba2d4fb99a631113494d376

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Fri, 23 Jun 2017 20:44:05 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:08 GMT
Server
NetDNA-cache/2.2
ETag
W/"54499a48-1764d"
Vary
Accept-Encoding
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 31 Dec 2037 23:55:55 GMT
js1.js
188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/
453 B
453 B
Script
General
Full URL
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/js1.js
Requested by
Host: 188.247.134.135
URL: http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) /
Resource Hash
10cebd0c0f6acd425dd9f2002fa182e536553bd88c27b24bef5349610034ba04

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/websc-login.php
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Fri, 23 Jun 2017 20:44:03 GMT
Last-Modified
Thu, 22 Jun 2017 15:18:10 GMT
Server
Apache/2.2.8 (CentOS)
ETag
"11a998-1c5-5528dfe11d080"
Content-Type
application/x-javascript
Connection
close
Accept-Ranges
bytes
Content-Length
453
Mahdi_1.png
188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/
31 KB
31 KB
Image
General
Full URL
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/Mahdi_1.png
Requested by
Host: code.jquery.com
URL: http://code.jquery.com/jquery.min.js
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) /
Resource Hash
f94fa1fde7ad44a42ed416919da3c001c4d1f450543071f56105d6c7bef5afdb

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/82d7e48fa5e2e4a9cd15a5eda68a5e2e/images/main.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.104 Safari/537.36

Response headers

Date
Fri, 23 Jun 2017 20:44:03 GMT
X-Pad
avoid browser bug
Last-Modified
Thu, 22 Jun 2017 15:18:10 GMT
Server
Apache/2.2.8 (CentOS)
ETag
"11a99b-7cd4-5528dfe11d080"
Content-Type
image/png
Connection
close
Accept-Ranges
bytes
Content-Length
31956

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies