paypal.me.laurentcourco.com
Open in
urlscan Pro
167.114.55.18
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On October 02 via api from US
Summary
This is the only time paypal.me.laurentcourco.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 167.114.55.18 167.114.55.18 | 16276 (OVH) (OVH) | |
11 | 1 |
ASN16276 (OVH, FR)
PTR: mjm.mjm.info
paypal.me.laurentcourco.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
laurentcourco.com
paypal.me.laurentcourco.com |
2 MB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | paypal.me.laurentcourco.com |
paypal.me.laurentcourco.com
|
11 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://paypal.me.laurentcourco.com/
Frame ID: DB2E1EE8F60B4556631815A624A532BC
Requests: 11 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
paypal.me.laurentcourco.com/ |
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.ltr.css
paypal.me.laurentcourco.com/public/css/ |
223 KB 223 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
page.c9a650b6b85d7c2bdddc.css
paypal.me.laurentcourco.com/public/css/ |
172 KB 172 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
contextualLogin.css
paypal.me.laurentcourco.com/public/css/ |
105 KB 105 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
tete.png
paypal.me.laurentcourco.com/public/img/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vx-lib.min.js
paypal.me.laurentcourco.com/public/js/ |
9 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
vendor.js
paypal.me.laurentcourco.com/public/js/ |
889 KB 889 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
flowBundle.js
paypal.me.laurentcourco.com/public/js/ |
875 KB 875 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pa.js
paypal.me.laurentcourco.com/public/js/ |
41 KB 41 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pp_fc_mg_2x.png
paypal.me.laurentcourco.com/public/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
PayPalSansSmall-Regular.woff2
paypal.me.laurentcourco.com/public/fonts/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)17 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| VX object| webpackJsonp object| core object| __core-js_shared__ object| global object| System function| asap function| Observable function| setImmediate function| clearImmediate object| regeneratorRuntime boolean| _babelPolyfill object| CW object| PAYPAL object| fpti string| fptiserverurl0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paypal.me.laurentcourco.com
167.114.55.18
0f866e33e0052a7791648151f590ab82ae78b42fb1c66ac6d4b3bd1e6304ecb1
6b6cee9042754f4ea2b7051ff0c27c082b14800f798ec52822957c95b0858df7
6da6d651e8045b34b1b21dc86ccebde531ffc61cfb34fbeb6ab0145f7a4d5304
72c699d5c4acd1f03732891640aab98147c19e871e36e461d956142037a147b5
9bb90c444c1397a7f601f497d6b1bb5f25d3fff017357581362e9c8f298dbf71
af93d1d952b2dc42c029871cbbb92988835b31c86d4f0cb6a9674b1d1714a20f
bd128b953cc80a01094dadb6d3b4f1025725677d55590854eb8f1a7a12be66c7
cd708f0de021ca42b742fd5b20debbefeb48a8a5f566b74b6014f8d72c521554
eb1dfc0ae94f820dd53fa78a0b140befde5c9f94d5d5769b4bd6a655ccc9c452
f043b2877f74c808428d890e23848d9bc996363bc1ec4c9181b36aa001012d2d
fb09c511a746af8737671bd1bd11245f3607a988293c567d2403f1bbadc75e90