activeeruwonlineacount.nl Open in urlscan Pro
81.169.145.162  Malicious Activity! Public Scan

URL: https://activeeruwonlineacount.nl/
Submission: On March 13 via automatic, source phishtank

Summary

This website contacted 6 IPs in 3 countries across 4 domains to perform 21 HTTP transactions. The main IP is 81.169.145.162, located in Berlin, Germany and belongs to STRATO STRATO AG, DE. The main domain is activeeruwonlineacount.nl.
TLS certificate: Issued by Encryption Everywhere DV TLS CA - G2 on March 10th 2018. Valid for: a year.
This is the only time activeeruwonlineacount.nl was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
13 81.169.145.162 6724 (STRATO ST...)
1 95.100.244.219 20940 (AKAMAI-ASN1)
2 92.123.121.15 1273 (CW Vodafo...)
2 2.20.202.231 16625 (AKAMAI-AS)
2 4 176.120.18.70 198911 (BML-AS)
21 6
Domain Requested by
13 activeeruwonlineacount.nl activeeruwonlineacount.nl
2 dub.stats.paypal.com activeeruwonlineacount.nl
2 b.stats.paypal.com 2 redirects
2 c.paypal.com activeeruwonlineacount.nl
2 t.paypal.com activeeruwonlineacount.nl
1 www.paypalobjects.com activeeruwonlineacount.nl
0 192.55.233.1 Failed activeeruwonlineacount.nl
21 7

This site contains links to these domains. Also see Links.

Domain
www.paypal.com
Subject Issuer Validity Valid
www.activeeruwonlineacount.nl
Encryption Everywhere DV TLS CA - G2
2018-03-10 -
2019-03-10
a year crt.sh

This page contains 5 frames:

Primary Page: https://activeeruwonlineacount.nl/
Frame ID: 229FE008219B21846DE585764B5FC886
Requests: 15 HTTP requests in this frame

Frame: https://activeeruwonlineacount.nl/files/saved_resource.html
Frame ID: DD17AA9FC14696A79F03C526161973D
Requests: 1 HTTP requests in this frame

Frame: https://activeeruwonlineacount.nl/files/saved_resource(1).html
Frame ID: E8DBB8D34B5B1DBE7824051692FC6ED7
Requests: 2 HTTP requests in this frame

Frame: https://activeeruwonlineacount.nl/files/i.html
Frame ID: EB35CFCEC2B14FF49EC5F3242E89CDF9
Requests: 2 HTTP requests in this frame

Frame: https://dub.stats.paypal.com/counter2.cgi
Frame ID: 3F2572CCB0A103841021039D19524F61
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Unix/i

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • env /^PAYPAL$/i

Overall confidence: 100%
Detected patterns
  • env /^Modernizr$/i

Page Statistics

21
Requests

62 %
HTTPS

0 %
IPv6

4
Domains

7
Subdomains

6
IPs

3
Countries

304 kB
Transfer

395 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 11
  • https://b.stats.paypal.com/v1/counter.cgi?r=cD00ODRmZGNiOWU5MTk0MzJkYmMwMmQzNTJlOTg3YTkxOCZpPTYyLjExMi4xMC4xMzImdD0xNTE5NzI0NzkzLjE5NiZhPTIxJnM9VU5JRklFRF9MT0dJTp1hUPaHApsODvFgHMyXl9VQo-zW HTTP 302
  • https://dub.stats.paypal.com/counter2.cgi
Request Chain 19
  • https://b.stats.paypal.com/v1/counter.cgi?r=cD00ODRmZGNiOWU5MTk0MzJkYmMwMmQzNTJlOTg3YTkxOCZpPTYyLjExMi4xMC4xMzImdD0xNTE5NzI0NzkzLjE5NiZhPTIxJnM9VU5JRklFRF9MT0dJTp1hUPaHApsODvFgHMyXl9VQo-zW HTTP 302
  • https://dub.stats.paypal.com/counter2.cgi

21 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
activeeruwonlineacount.nl/
107 KB
108 KB
Document
General
Full URL
https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) / PHP/7.1.13
Resource Hash
70140d26899c946dce633edcfde7981b5f1464d11ac0e113cd951afa233b3824

Request headers

:path
/
pragma
no-cache
accept-encoding
gzip, deflate
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
:scheme
https
:method
GET
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

status
200
date
Tue, 13 Mar 2018 05:34:41 GMT
server
Apache/2.4.29 (Unix)
x-powered-by
PHP/7.1.13
content-type
text/html
contextualLogin.css
activeeruwonlineacount.nl/files/
68 KB
69 KB
Stylesheet
General
Full URL
https://activeeruwonlineacount.nl/files/contextualLogin.css
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
0b02d23258cb54e52a2295dab92327b069e10e004ad44127f50435561e9e9c4d

Request headers

:path
/files/contextualLogin.css
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
text/css,*/*;q=0.1
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:33 GMT
server
Apache/2.4.29 (Unix)
etag
"111e2-5673c70e5fcb4"
content-type
text/css
status
200
accept-ranges
bytes
content-length
70114
icon-PN-check.png
activeeruwonlineacount.nl/files/
2 KB
2 KB
Image
General
Full URL
https://activeeruwonlineacount.nl/files/icon-PN-check.png
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
4a77d272b8cf508cc4a7e0da5763faa9958e42a5554fdb5d29fc3be51d685653

Request headers

:path
/files/icon-PN-check.png
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:34 GMT
server
Apache/2.4.29 (Unix)
etag
"8bc-5673c70f0c656"
content-type
image/png
status
200
accept-ranges
bytes
content-length
2236
glyph_alert_critical_big-2x.png
activeeruwonlineacount.nl/files/
6 KB
6 KB
Image
General
Full URL
https://activeeruwonlineacount.nl/files/glyph_alert_critical_big-2x.png
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
13e4806e5c517e074ab1ea26fe0f2b7b87eaa3988006f35ed0bd4c89502d0d79

Request headers

:path
/files/glyph_alert_critical_big-2x.png
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:33 GMT
server
Apache/2.4.29 (Unix)
etag
"16c4-5673c70eed65d"
content-type
image/png
status
200
accept-ranges
bytes
content-length
5828
pa.js.download
activeeruwonlineacount.nl/files/
33 KB
33 KB
Script
General
Full URL
https://activeeruwonlineacount.nl/files/pa.js.download
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
d192e8079e6281352f90d96c06353e87003420e9e0649c40e21166639b680441

Request headers

:path
/files/pa.js.download
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:34 GMT
server
Apache/2.4.29 (Unix)
etag
"82e9-5673c70f42d44"
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
33513
fb-all-prod.pp2.min.js.download
activeeruwonlineacount.nl/files/
58 KB
58 KB
Script
General
Full URL
https://activeeruwonlineacount.nl/files/fb-all-prod.pp2.min.js.download
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
eda0a3b80b9a6c146817151721cb4e4c38bb88bae41419df26f5f67156fa14b3

Request headers

:path
/files/fb-all-prod.pp2.min.js.download
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:33 GMT
server
Apache/2.4.29 (Unix)
etag
"e653-5673c70e8b3d4"
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
58963
w
activeeruwonlineacount.nl/files/
0
44 B
Image
General
Full URL
https://activeeruwonlineacount.nl/files/w
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

:path
/files/w
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
image/webp,image/apng,image/*,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

status
200
date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:34 GMT
server
Apache/2.4.29 (Unix)
accept-ranges
bytes
etag
"0-5673c70fbd666"
content-length
0
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
SPDY
Server
95.100.244.219 , European Union, ASN20940 (AKAMAI-ASN1, US),
Reverse DNS
a95-100-244-219.deploy.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://activeeruwonlineacount.nl/files/contextualLogin.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
x-content-type-options
nosniff
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
strict-transport-security
max-age=31536000
accept-ranges
bytes
content-length
4945
expires
Thu, 12 Apr 2018 05:34:41 GMT
saved_resource.html
activeeruwonlineacount.nl/files/ Frame DD17
149 B
197 B
Document
General
Full URL
https://activeeruwonlineacount.nl/files/saved_resource.html
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
97f9b10039b05e1af4a3c9b778fc72ba44cf68a376e4ec1d55f2558f16cf3e50

Request headers

:path
/files/saved_resource.html
pragma
no-cache
accept-encoding
gzip, deflate
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Upgrade-Insecure-Requests
1
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:34 GMT
server
Apache/2.4.29 (Unix)
etag
"95-5673c70f6dcd6"
content-type
text/html
status
200
accept-ranges
bytes
content-length
149
ts
t.paypal.com/
42 B
728 B
Image
General
Full URL
https://t.paypal.com/ts?v=1.2.0&t=1520919281485&g=0&e=im&pgrp=main%3Aunifiedlogin%3A%3A%3Alogin&page=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&tmpl=unifiedloginnodeweb%2Fpublic%2Ftemplates%2FcontextualLoginView%2Fsignin.dust&pgst=1519724793112&calc=b2f6890479a3&rsta=nl_NL&pgtf=Nodejs&s=ci&csci=484fdcb9e919432dbc02d352e987a918&comp=unifiedloginnodeweb&tsrce=mppnodeweb&transition_name=ss_prepare_pwd&xe=2322%2C3238%2C3182%2C2923%2C3465&xt=5566%2C7720%2C7594%2C6993%2C8254&fn_sync_enabled=Y&ctx_login_ot_content=1&obex=signin&landing_page=login&state_name=begin_pwd&ctx_login_ctxid_fetch=ctxid-not-exist&ctx_login_content_fetch=success&ctx_login_lang_footer=shown&ctx_login_signup_btn=shown%7Cdefault&ctx_login_intent=signin&ctx_login_flow=Signin&ctx_login_state_transition=login_loaded&post_login_redirect=default&ret_url=%2F&view=%7B%22t10%22%3A57%2C%22t14%22%3A1520919281238%2C%22t11%22%3A243.5%7D&pt=Log%20in%20op%20uw%20PayPal-rekening&cd=24&sw=1600&sh=1200&dw=1600&dh=1200&bw=1600&bh=1200&ce=1&t1=57&t1c=56&t1d=0&t1s=33&t2=72&t3=67&t4d=0&t4=0&t4e=0&tt=0&res=%7B%22css%22%3A%7B%22t9%22%3A66.4%2C%22t12%22%3A66.4%2C%22t13%22%3A0%2C%22cnt%22%3A1%7D%2C%22scr%22%3A%7B%22t9%22%3A61.7%2C%22t12%22%3A59%2C%22t13%22%3A0%2C%22cnt%22%3A2%7D%2C%22img%22%3A%7B%22t9%22%3A97.1%2C%22t12%22%3A57.5%2C%22t13%22%3A0%2C%22cnt%22%3A3%7D%2C%22othr%22%3A%7B%22t9%22%3Anull%2C%22t12%22%3A0%2C%22t13%22%3A0%2C%22cnt%22%3A2%7D%7D
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
HTTP/1.1
Server
92.123.121.15 , European Union, ASN1273 (CW Vodafone Group PLC, GB),
Reverse DNS
a92-123-121-15.deploy.akamaitechnologies.com
Software
akka-http/10.0.9-PayPal-2 /
Resource Hash
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93

Request headers

Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 13 Mar 2018 05:34:41 GMT
Server
akka-http/10.0.9-PayPal-2
P3P
policyref="https://t.paypal.com/w3c/p3p.xml",CP="CAO IND OUR SAM UNI STA COR COM"
HTTP_X_PP_AZ_LOCATOR
slca.slc
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Tue, 13 Mar 2018 05:34:41 GMT
e
c.paypal.com/v1/r/d/b/
18 B
756 B
Script
General
Full URL
https://c.paypal.com/v1/r/d/b/e?e=Uncaught%20ReferenceError%3A%20data%20is%20not%20defined20171003&ep=abh
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/files/fb-all-prod.pp2.min.js.download
Protocol
HTTP/1.1
Server
2.20.202.231 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
38b69e3b3bff3cfecfd24783700c41a742a09e2100e9e9f56b947d21ef03fadc

Request headers

Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
No-cache, no-cache
Date
Tue, 13 Mar 2018 05:34:41 GMT
CORRELATION-ID
f4a8021e917a8
Server
Apache
Cache-Control
no-cache, max-age=0, no-cache, no-store, must-revalidate
Content-Type
application/json
Paypal-Debug-Id
f4a8021e917a8
HTTP_X_PP_AZ_LOCATOR
dcg11.slc
X-Cnection
close
Connection
keep-alive
Content-Length
18
Expires
Wed, 31 Dec 1969 16:00:00 PST
saved_resource(1).html
activeeruwonlineacount.nl/files/ Frame E8DB
418 B
466 B
Document
General
Full URL
https://activeeruwonlineacount.nl/files/saved_resource(1).html
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
28bebfb0222771f45c4e8be6014e1f6fe39c1e403997cb0df9b055d68d10a9b9

Request headers

:path
/files/saved_resource(1).html
pragma
no-cache
accept-encoding
gzip, deflate
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Upgrade-Insecure-Requests
1
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:34 GMT
server
Apache/2.4.29 (Unix)
etag
"1a2-5673c70f3660a"
content-type
text/html
status
200
accept-ranges
bytes
content-length
418
counter2.cgi
dub.stats.paypal.com/ Frame E8DB
Redirect Chain
  • https://b.stats.paypal.com/v1/counter.cgi?r=cD00ODRmZGNiOWU5MTk0MzJkYmMwMmQzNTJlOTg3YTkxOCZpPTYyLjExMi4xMC4xMzImdD0xNTE5NzI0NzkzLjE5NiZhPTIxJnM9VU5JRklFRF9MT0dJTp1hUPaHApsODvFgHMyXl9VQo-zW
  • https://dub.stats.paypal.com/counter2.cgi
42 B
494 B
Image
General
Full URL
https://dub.stats.paypal.com/counter2.cgi
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/files/saved_resource(1).html
Protocol
HTTP/1.1
Server
176.120.18.70 , United States, ASN198911 (BML-AS, US),
Reverse DNS
Software
/
Resource Hash
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292

Request headers

Referer
https://activeeruwonlineacount.nl/files/saved_resource(1).html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 13 Mar 2018 05:34:41 GMT
Cache-Control
private, must-revalidate, proxy-revalidate
Server
Connection
close
ETag
"f466b08eb8ec7bc3f018"
Content-Length
42
Content-type
image/jpeg

Redirect headers

Location
https://dub.stats.paypal.com/counter2.cgi
Date
Tue, 13 Mar 2018 05:34:41 GMT
Server
Connection
close
Content-Length
289
Content-Type
text/html; charset=utf-8
i.html
activeeruwonlineacount.nl/files/ Frame EB35
361 B
409 B
Document
General
Full URL
https://activeeruwonlineacount.nl/files/i.html
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
63386420d9c5c8ebedea0a42ad16998fbadf11d7b4ca0343ee8b0e021a81f61d

Request headers

:path
/files/i.html
pragma
no-cache
accept-encoding
gzip, deflate
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET
Upgrade-Insecure-Requests
1
Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:34 GMT
server
Apache/2.4.29 (Unix)
etag
"169-5673c70efdfdb"
content-type
text/html
status
200
accept-ranges
bytes
content-length
361
fb-all-prod.pp2.min.js.download
activeeruwonlineacount.nl/files/ Frame EB35
58 KB
0
Script
General
Full URL
https://activeeruwonlineacount.nl/files/fb-all-prod.pp2.min.js.download
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/files/i.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
eda0a3b80b9a6c146817151721cb4e4c38bb88bae41419df26f5f67156fa14b3

Request headers

:path
/files/fb-all-prod.pp2.min.js.download
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
*/*
cache-control
no-cache
:authority
activeeruwonlineacount.nl
referer
https://activeeruwonlineacount.nl/
:scheme
https
:method
GET

Response headers

date
Tue, 13 Mar 2018 05:34:41 GMT
last-modified
Mon, 12 Mar 2018 19:49:33 GMT
server
Apache/2.4.29 (Unix)
etag
"e653-5673c70e8b3d4"
content-type
application/javascript
status
200
accept-ranges
bytes
content-length
58963
challenge.js
activeeruwonlineacount.nl/auth/createchallenge/bfd3429b98f99b1e/
248 B
298 B
XHR
General
Full URL
https://activeeruwonlineacount.nl/auth/createchallenge/bfd3429b98f99b1e/challenge.js
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
e41c80dd62769fb337fb9f61861f142ab059fd482d7629ce6bdecfb29f1e668a

Request headers

:path
/auth/createchallenge/bfd3429b98f99b1e/challenge.js
pragma
no-cache
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
accept
application/json
cache-control
no-cache
:authority
activeeruwonlineacount.nl
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://activeeruwonlineacount.nl/
:method
GET
Accept
application/json
Referer
https://activeeruwonlineacount.nl/
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

status
404
date
Tue, 13 Mar 2018 05:34:41 GMT
server
Apache/2.4.29 (Unix)
content-length
248
content-type
text/html; charset=iso-8859-1
fb-all-prod.pp2.min.js
c.paypal.com/webstatic/r/fb/
58 KB
18 KB
Script
General
Full URL
https://c.paypal.com/webstatic/r/fb/fb-all-prod.pp2.min.js
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
HTTP/1.1
Server
2.20.202.231 , European Union, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
Software
Apache /
Resource Hash
eda0a3b80b9a6c146817151721cb4e4c38bb88bae41419df26f5f67156fa14b3

Request headers

Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 13 Mar 2018 05:34:41 GMT
X-Pad
avoid browser bug
Last-Modified
Wed, 04 Oct 2017 04:33:25 GMT
Server
Apache
Vary
Accept-Encoding
Content-Type
application/x-javascript
Cache-Control
max-age=86400
Connection
keep-alive
Accept-Ranges
bytes
Content-Encoding
gzip
Content-Length
18154
Expires
Wed, 14 Mar 2018 05:34:41 GMT
client-log
activeeruwonlineacount.nl/signin/
215 B
242 B
XHR
General
Full URL
https://activeeruwonlineacount.nl/signin/client-log
Requested by
Host: activeeruwonlineacount.nl
URL: https://activeeruwonlineacount.nl/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
81.169.145.162 Berlin, Germany, ASN6724 (STRATO STRATO AG, DE),
Reverse DNS
wa2.rzone.de
Software
Apache/2.4.29 (Unix) /
Resource Hash
3985213ce89eec8dda7f1a9839c529647c2a8e04f8993e413ac1e44d74c25808

Request headers

:path
/signin/client-log
pragma
no-cache
origin
https://activeeruwonlineacount.nl
accept-encoding
gzip, deflate
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
content-type
application/x-www-form-urlencoded
accept
application/json
cache-control
no-cache
:authority
activeeruwonlineacount.nl
x-requested-with
XMLHttpRequest
:scheme
https
referer
https://activeeruwonlineacount.nl/
content-length
861
:method
POST
Accept
application/json
Referer
https://activeeruwonlineacount.nl/
Origin
https://activeeruwonlineacount.nl
X-Requested-With
XMLHttpRequest
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Content-type
application/x-www-form-urlencoded

Response headers

status
404
date
Tue, 13 Mar 2018 05:34:41 GMT
server
Apache/2.4.29 (Unix)
content-length
215
content-type
text/html; charset=iso-8859-1
resourceaccesstoken
192.55.233.1/
0
0

ts
t.paypal.com/
42 B
728 B
Image
General
Full URL
https://t.paypal.com/ts?v=1.2.0&t=1520919281983&g=0&e=im&pgrp=main%3Aunifiedlogin%3A%3A%3Alogin&page=main%3Aunifiedlogin%3A%3A%3Alogin%3A%3A%3A&tmpl=unifiedloginnodeweb%2Fpublic%2Ftemplates%2FcontextualLoginView%2Fsignin.dust&pgst=1519724793112&calc=b2f6890479a3&rsta=nl_NL&pgtf=Nodejs&s=ci&csci=484fdcb9e919432dbc02d352e987a918&comp=unifiedloginnodeweb&tsrce=mppnodeweb&transition_name=ss_prepare_pwd&xe=2322%2C3238%2C3182%2C2923%2C3465&xt=5566%2C7720%2C7594%2C6993%2C8254&fn_sync_enabled=Y&ctx_login_ot_content=1&obex=signin&landing_page=login&state_name=begin_pwd&ctx_login_ctxid_fetch=ctxid-not-exist&ctx_login_content_fetch=success&ctx_login_lang_footer=shown&ctx_login_signup_btn=shown%7Cdefault&ctx_login_intent=signin&ctx_login_flow=Signin&ctx_login_state_transition=login_loaded&post_login_redirect=default&ret_url=%2F&pt=Log%20in%20op%20uw%20PayPal-rekening&cd=24&sw=1600&sh=1200&dw=1600&dh=1200&bw=1600&bh=1200&ce=1
Protocol
HTTP/1.1
Server
92.123.121.15 , European Union, ASN1273 (CW Vodafone Group PLC, GB),
Reverse DNS
a92-123-121-15.deploy.akamaitechnologies.com
Software
akka-http/10.0.9-PayPal-2 /
Resource Hash
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93

Request headers

Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Tue, 13 Mar 2018 05:34:42 GMT
Server
akka-http/10.0.9-PayPal-2
P3P
policyref="https://t.paypal.com/w3c/p3p.xml",CP="CAO IND OUR SAM UNI STA COR COM"
HTTP_X_PP_AZ_LOCATOR
slca.slc
Cache-Control
max-age=0, no-cache, no-store
Connection
keep-alive
Content-Type
image/gif
Content-Length
42
Expires
Tue, 13 Mar 2018 05:34:42 GMT
counter2.cgi
dub.stats.paypal.com/ Frame 3F25
Redirect Chain
  • https://b.stats.paypal.com/v1/counter.cgi?r=cD00ODRmZGNiOWU5MTk0MzJkYmMwMmQzNTJlOTg3YTkxOCZpPTYyLjExMi4xMC4xMzImdD0xNTE5NzI0NzkzLjE5NiZhPTIxJnM9VU5JRklFRF9MT0dJTp1hUPaHApsODvFgHMyXl9VQo-zW
  • https://dub.stats.paypal.com/counter2.cgi
42 B
494 B
Image
General
Full URL
https://dub.stats.paypal.com/counter2.cgi
Protocol
HTTP/1.1
Server
176.120.18.70 , United States, ASN198911 (BML-AS, US),
Reverse DNS
Software
/
Resource Hash
47043e4823a6c21a8881de789b4185355330b5804629d23f6b43dd93f5265292

Request headers

Referer
https://activeeruwonlineacount.nl/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Tue, 13 Mar 2018 05:34:42 GMT
Cache-Control
private, must-revalidate, proxy-revalidate
Server
Connection
close
ETag
"b0bb47377b9fba629620"
Content-Length
42
Content-type
image/jpeg

Redirect headers

Location
https://dub.stats.paypal.com/counter2.cgi
Date
Tue, 13 Mar 2018 05:34:42 GMT
Server
Connection
close
Content-Length
289
Content-Type
text/html; charset=utf-8

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
192.55.233.1
URL
https://192.55.233.1/resourceaccesstoken

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

38 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| html5 object| Modernizr function| isEligibleIntegration object| antiClickjack object| PAYPAL function| $ function| _classCallCheck function| _typeof function| _createClass number| HTTPOK string| HTTPGET string| HTTPPOST number| DEFAULT_XHR_TIMEOUT object| fpti string| fptiserverurl function| AjaxRequest string| PP_SERVICE_URL string| BASE_SWF_URL string| BEACON_BASE_URL string| PP_IFRAME_JS_URL string| PP_NEW_SERVICE_URL string| PP_VERSION object| Configuration object| PFB_4732Config object| PFB_4732 object| dataCollector object| fp undefined| runFb function| initTsFb object| jstz function| SwfStore function| SlvtStore object| _0xc4c9 function| _0x9c4c object| d function| fefedefbdda object| err boolean| error

0 Cookies