updateyourpaypalaccount.gq Open in urlscan Pro
193.70.112.233  Malicious Activity! Public Scan

URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Submission: On March 26 via manual from US

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 7 HTTP transactions. The main IP is 193.70.112.233, located in France and belongs to OVH, FR. The main domain is updateyourpaypalaccount.gq.
This is the only time updateyourpaypalaccount.gq was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
3 193.70.112.233 16276 (OVH)
1 108.161.189.121 54104 (AS-STACKPATH)
3 23.53.173.12 16625 (AKAMAI-AS)
7 3
Domain Requested by
3 www.paypalobjects.com updateyourpaypalaccount.gq
3 updateyourpaypalaccount.gq updateyourpaypalaccount.gq
1 maxcdn.bootstrapcdn.com updateyourpaypalaccount.gq
7 3

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Frame ID: BF2D6B0896589F4B597D901C1F3EFF5B
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js/i

Overall confidence: 100%
Detected patterns
  • script /(?:twitter\.github\.com\/bootstrap|bootstrap(?:\.js|\.min\.js))/i

Page Statistics

7
Requests

0 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

55 kB
Transfer

78 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
5 KB
5 KB
Document
General
Full URL
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
HTTP/1.1
Server
193.70.112.233 , France, ASN16276 (OVH, FR),
Reverse DNS
233.ip-193-70-112.eu
Software
Apache /
Resource Hash
f548b9c06dc26d436f4d5168b53d3b4ca25cff45dd7f3bd1e4c4cbbe5e7dd6fd

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
updateyourpaypalaccount.gq
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Cache-Control
no-cache
Connection
keep-alive
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Pragma
no-cache
Date
Mon, 26 Mar 2018 01:48:02 GMT
Server
Apache
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
Set-Cookie
PHPSESSID=nbupjr1ri97ak3t24hk20qs271; path=/
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Expires
Thu, 19 Nov 1981 08:52:00 GMT
style.css
updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/
24 KB
25 KB
Stylesheet
General
Full URL
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/style.css
Requested by
Host: updateyourpaypalaccount.gq
URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
HTTP/1.1
Server
193.70.112.233 , France, ASN16276 (OVH, FR),
Reverse DNS
233.ip-193-70-112.eu
Software
Apache /
Resource Hash
562e585efab210b7cbdb49a5f72814f7d561486e7368159e1ef38531d38afc88

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
updateyourpaypalaccount.gq
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
text/css,*/*;q=0.1
Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Cookie
PHPSESSID=nbupjr1ri97ak3t24hk20qs271
Connection
keep-alive
Cache-Control
no-cache
Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Mon, 26 Mar 2018 01:48:02 GMT
Last-Modified
Mon, 21 Dec 2015 05:07:52 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
25054
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/
36 KB
11 KB
Script
General
Full URL
https://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/js/bootstrap.min.js
Requested by
Host: updateyourpaypalaccount.gq
URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
SPDY
Server
108.161.189.121 Los Angeles, United States, ASN54104 (AS-STACKPATH - netDNA, US),
Reverse DNS
Software
NetDNA-cache/2.2 /
Resource Hash
2979f9a6e32fc42c3e7406339ee9fe76b31d1b52059776a02b4a7fa6a4fd280a

Request headers

User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Origin
http://updateyourpaypalaccount.gq

Response headers

date
Mon, 26 Mar 2018 01:48:03 GMT
content-encoding
gzip
last-modified
Tue, 20 Feb 2018 05:58:02 GMT
server
NetDNA-cache/2.2
status
200
etag
W/"c5b5b2fa19bd66ff23211d9f844e0131"
vary
Accept-Encoding
x-cache
HIT
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=31104000
x-hello-human
Say hello back! @getBootstrapCDN on Twitter
expires
Thu, 21 Mar 2019 01:48:03 GMT
peek-shield-logo.png
updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/
4 KB
5 KB
Image
General
Full URL
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/peek-shield-logo.png
Requested by
Host: updateyourpaypalaccount.gq
URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
HTTP/1.1
Server
193.70.112.233 , France, ASN16276 (OVH, FR),
Reverse DNS
233.ip-193-70-112.eu
Software
Apache /
Resource Hash
6c24e9fc3844d713e81e8182d435b1ec16df0b291e559742c5842f995b2e0498

Request headers

Pragma
no-cache
Accept-Encoding
gzip, deflate
Host
updateyourpaypalaccount.gq
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36
Accept
image/webp,image/apng,image/*,*/*;q=0.8
Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Cookie
PHPSESSID=nbupjr1ri97ak3t24hk20qs271
Connection
keep-alive
Cache-Control
no-cache
Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

Date
Mon, 26 Mar 2018 01:48:02 GMT
Last-Modified
Tue, 24 Nov 2015 11:13:30 GMT
Server
Apache
Content-Type
image/png
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
Content-Length
4440
scr_content-bkgd.png
www.paypalobjects.com/webstatic/i/ex_ce2/scr/
3 KB
3 KB
Image
General
Full URL
https://www.paypalobjects.com/webstatic/i/ex_ce2/scr/scr_content-bkgd.png
Requested by
Host: updateyourpaypalaccount.gq
URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
SPDY
Server
23.53.173.12 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-53-173-12.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
0de9dc4df795b30e9fa458090c49ab8137e65a7901803c81895cef56ac543d13
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 26 Mar 2018 01:48:03 GMT
x-content-type-options
nosniff
last-modified
Tue, 07 Jan 2014 00:36:46 GMT
server
Apache
strict-transport-security
max-age=31536000
p3p
CP="NON DSP ADM DEV PSD OUR IND STP PHY PRE NAV UNI"
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-type
image/png
content-length
2681
expires
Mon, 26 Mar 2018 01:48:03 GMT
interior-gradient-top.png
www.paypalobjects.com/webstatic/mktg/consumer/gradients/
952 B
1 KB
Image
General
Full URL
https://www.paypalobjects.com/webstatic/mktg/consumer/gradients/interior-gradient-top.png
Requested by
Host: updateyourpaypalaccount.gq
URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
SPDY
Server
23.53.173.12 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-53-173-12.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
f2c173be6a198adf60868c86f6e093f3b850bef0da34689e981fe218ad2a43a1
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

pragma
no-cache
date
Mon, 26 Mar 2018 01:48:03 GMT
x-content-type-options
nosniff
last-modified
Tue, 07 Jan 2014 00:43:12 GMT
server
Apache
strict-transport-security
max-age=31536000
p3p
CP="NON DSP ADM DEV PSD OUR IND STP PHY PRE NAV UNI"
status
200
cache-control
max-age=0, no-cache, no-store
accept-ranges
bytes
content-type
image/png
content-length
952
expires
Mon, 26 Mar 2018 01:48:03 GMT
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: updateyourpaypalaccount.gq
URL: http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/suspicious/
Protocol
SPDY
Server
23.53.173.12 Cambridge, United States, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a23-53-173-12.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://updateyourpaypalaccount.gq/upload-your-acount-information/scam/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_12_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.84 Safari/537.36

Response headers

date
Mon, 26 Mar 2018 01:48:03 GMT
x-content-type-options
nosniff
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
strict-transport-security
max-age=31536000
accept-ranges
bytes
content-length
4945
expires
Wed, 25 Apr 2018 01:48:03 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
updateyourpaypalaccount.gq/ Name: PHPSESSID
Value: nbupjr1ri97ak3t24hk20qs271