eggbox.top Open in urlscan Pro
2606:4700:3036::ac43:b34d  Malicious Activity! Public Scan

Submitted URL: https://eggbox.top/pay/bbzhifu
Effective URL: https://eggbox.top/pay/error
Submission Tags: phishing malicious Search All
Submission: On July 28 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 2606:4700:3036::ac43:b34d, located in United States and belongs to CLOUDFLARENET, US. The main domain is eggbox.top.
TLS certificate: Issued by R3 on July 7th 2021. Valid for: 3 months.
This is the only time eggbox.top was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 2 2606:4700:303... 13335 (CLOUDFLAR...)
1 104.111.228.123 16625 (AKAMAI-AS)
2 2
Apex Domain
Subdomains
Transfer
2 eggbox.top
eggbox.top
3 KB
1 paypalobjects.com
www.paypalobjects.com
16 KB
2 2
Domain Requested by
2 eggbox.top 1 redirects
1 www.paypalobjects.com eggbox.top
2 2

This site contains links to these domains. Also see Links.

Domain
www.paypal.com
Subject Issuer Validity Valid
*.eggbox.top
R3
2021-07-07 -
2021-10-05
3 months crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2021-07-08 -
2022-01-11
6 months crt.sh

This page contains 1 frames:

Primary Page: https://eggbox.top/pay/error
Frame ID: 35225850CBBF367C5DFB07D6609337BB
Requests: 2 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://eggbox.top/pay/bbzhifu HTTP 302
    https://eggbox.top/pay/error Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Page Statistics

2
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

18 kB
Transfer

21 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://eggbox.top/pay/bbzhifu HTTP 302
    https://eggbox.top/pay/error Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request error
eggbox.top/pay/
Redirect Chain
  • https://eggbox.top/pay/bbzhifu
  • https://eggbox.top/pay/error
6 KB
2 KB
Document
General
Full URL
https://eggbox.top/pay/error
Protocol
H3-29
Security
QUIC, , AES_128_GCM
Server
2606:4700:3036::ac43:b34d , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
82b26471458319300aee83778911bad63d34666c2a618e9f03bf2291aa3b4a34
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

:method
GET
:authority
eggbox.top
:scheme
https
:path
/pay/error
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 28 Jul 2021 20:57:51 GMT
content-type
text/html;charset=utf8
cf-cache-status
DYNAMIC
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=CxQLDFrvcyThLSjrDvJsVCoSdQ75vAdsfjUfKF8lCIoPa8NxHE6aXwjBfoizQCLHxSPmGazp91Fyal6eR18FZTDXcOG6Utq2LuyHoDXvuRf7%2FOAB71601Y9ZLoED988S9mbjhihs"}],"group":"cf-nel","max_age":604800}
nel
{"report_to":"cf-nel","max_age":604800}
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
strict-transport-security
max-age=31536000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
676105aebbae177e-FRA
content-encoding
br

Redirect headers

date
Wed, 28 Jul 2021 20:57:51 GMT
content-type
text/html;charset=utf8
location
/pay/error
cf-cache-status
DYNAMIC
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=5rj%2BIc9%2Bn5LMotLX0%2B74oF%2Bm4Lc4sFrVtCPZfC3mhDCqQoIiR4vtyuQ3GKwI%2BHRVe0v1D7lrF9%2FAQC%2FzsB7CQC4m4lkyHWv9tATv5DIKvazCti8%2B4%2F3WrdrOeyQhfg65drr5E1oU"}],"group":"cf-nel","max_age":604800}
nel
{"report_to":"cf-nel","max_age":604800}
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400, h3=":443"; ma=86400
strict-transport-security
max-age=31536000
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
676105ad0b6f9ab0-FRA
hermes_window_sprite_v16.png
www.paypalobjects.com/images/checkout/hermes/
15 KB
16 KB
Image
General
Full URL
https://www.paypalobjects.com/images/checkout/hermes/hermes_window_sprite_v16.png
Requested by
Host: eggbox.top
URL: https://eggbox.top/pay/error
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.228.123 Frankfurt am Main, Germany, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-228-123.deploy.static.akamaitechnologies.com
Software
Akamai Image Manager /
Resource Hash
723926009003ace2a90c304b2200cab37fe3ed70b029e2302f479e07863c93e9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
https://eggbox.top/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 28 Jul 2021 20:57:51 GMT
x-content-type-options
nosniff
x-check-cacheable
YES
x-serial
350
etag
"nnzRlS9MBgJaF5KTitXTyIJxOe9T0imDmyJbBzcjo2U"
strict-transport-security
max-age=31536000
content-type
image/webp
cache-control
private, no-transform, max-age=43200
last-modified
Sat, 24 Apr 2021 02:13:15 GMT
content-length
15750
server
Akamai Image Manager
expires
Thu, 29 Jul 2021 08:57:51 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

eggbox.top
www.paypalobjects.com
104.111.228.123
2606:4700:3036::ac43:b34d
723926009003ace2a90c304b2200cab37fe3ed70b029e2302f479e07863c93e9
82b26471458319300aee83778911bad63d34666c2a618e9f03bf2291aa3b4a34