payu24.de
Open in
urlscan Pro
2606:4700:3032::ac43:aadb
Malicious Activity!
Public Scan
Effective URL: https://payu24.de/s/klmao
Submission: On October 17 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on June 8th 2022. Valid for: a year.
This is the only time payu24.de was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 2606:4700:303... 2606:4700:3032::ac43:aadb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 1 |
Domain | Requested by | |
---|---|---|
10 | payu24.de |
1 redirects
payu24.de
|
9 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-06-08 - 2023-06-07 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://payu24.de/s/klmao
Frame ID: C88BB048B8A65777A5F2765420915A74
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Facebook – zaloguj się lub zarejestrujPage URL History Show full URLs
-
http://payu24.de/s/klmao
HTTP 301
https://payu24.de/s/klmao Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://payu24.de/s/klmao
HTTP 301
https://payu24.de/s/klmao Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
klmao
payu24.de/s/ Redirect Chain
|
15 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bxxuzrdTgyg.css
payu24.de/assets/phishing/fb/ |
16 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OssD9jBxccC.css
payu24.de/assets/phishing/fb/ |
378 B 509 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
uliV2kFi04_.css
payu24.de/assets/phishing/fb/ |
7 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
l8544TqYVTV.css
payu24.de/assets/phishing/fb/ |
12 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kl_w5gQwgre.css
payu24.de/assets/phishing/fb/ |
17 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dF5SId3UHWd.svg
payu24.de/assets/phishing/fb/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
O7nelmd9XSI.png
payu24.de/assets/phishing/fb/ |
95 B 579 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
VcstZr4fYTz.png
payu24.de/assets/phishing/fb/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
payu24.de/ | Name: PHPSESSID Value: ej1alm4qf0cruj1sbm4f149mn9 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
payu24.de
2606:4700:3032::ac43:aadb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