URL: http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Submission Tags: @ipnigh
Submission: On August 11 via api from GB

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 5 HTTP transactions. The main IP is 143.95.226.60, located in Los Angeles, United States and belongs to ASMALLORANGE1 - A Small Orange LLC, US. The main domain is blairbagley.com.
This is the only time blairbagley.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 5 143.95.226.60 62729 (ASMALLORA...)
1 205.185.208.52 20446 (HIGHWINDS3)
5 2
Apex Domain
Subdomains
Transfer
5 blairbagley.com
blairbagley.com
34 KB
1 jquery.com
code.jquery.com
33 KB
5 2
Domain Requested by
5 blairbagley.com 1 redirects blairbagley.com
code.jquery.com
1 code.jquery.com blairbagley.com
5 2

This site contains no links.

Subject Issuer Validity Valid

1970-01-01 -
1970-01-01
a few seconds crt.sh

This page contains 1 frames:

Primary Page: http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Frame ID: 4212D923BA3295ED1118D01395F59733
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7 HTTP 301
    http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

5
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

67 kB
Transfer

128 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7 HTTP 301
    http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Redirect Chain
  • http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7
  • http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
985 B
905 B
Document
General
Full URL
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Protocol
HTTP/1.1
Server
143.95.226.60 Los Angeles, United States, ASN62729 (ASMALLORANGE1 - A Small Orange LLC, US),
Reverse DNS
ip-143-95-226-60.iplocal
Software
nginx/1.16.0 /
Resource Hash
1f86ffe9ac4498ca6dc8f57f73e9b30fbf99808f3dabb7fac829464167d78882

Request headers

Host
blairbagley.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Server
nginx/1.16.0
Date
Sun, 11 Aug 2019 19:33:56 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=ul5dl1r00kkehrsdhtsh8ha7r1; path=/
Content-Encoding
gzip

Redirect headers

Server
nginx/1.16.0
Date
Sun, 11 Aug 2019 19:33:56 GMT
Content-Type
text/html; charset=iso-8859-1
Content-Length
285
Connection
keep-alive
Location
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
main.css
blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/
2 KB
972 B
Stylesheet
General
Full URL
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/main.css
Requested by
Host: blairbagley.com
URL: http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Protocol
HTTP/1.1
Security
, ,
Server
143.95.226.60 Los Angeles, United States, ASN62729 (ASMALLORANGE1 - A Small Orange LLC, US),
Reverse DNS
ip-143-95-226-60.iplocal
Software
nginx/1.16.0 /
Resource Hash
1d9ca1fb34f6343ef6a7fe8ab6ba2f531749bcd79c3bc63de5ae0bd8667b93ed

Request headers

Referer
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:33:56 GMT
Content-Encoding
gzip
Last-Modified
Sat, 10 Aug 2019 09:22:56 GMT
Server
nginx/1.16.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
text/css
jquery.min.js
code.jquery.com/
94 KB
33 KB
Script
General
Full URL
http://code.jquery.com/jquery.min.js
Requested by
Host: blairbagley.com
URL: http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Protocol
HTTP/1.1
Security
, ,
Server
205.185.208.52 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
vip052.ssl.hwcdn.net
Software
nginx /
Resource Hash
4b940065e2a67c37e3bd02b23c651f4744a3c219aba2d4fb99a631113494d376

Request headers

Referer
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:34:07 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:08 GMT
Server
nginx
ETag
W/"54499a48-1764d"
Vary
Accept-Encoding
X-HW
1565552047.dop004.ml1.t,1565552047.cds023.ml1.c
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
33226
js1.js
blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/
453 B
534 B
Script
General
Full URL
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/js1.js
Requested by
Host: blairbagley.com
URL: http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
Protocol
HTTP/1.1
Security
, ,
Server
143.95.226.60 Los Angeles, United States, ASN62729 (ASMALLORANGE1 - A Small Orange LLC, US),
Reverse DNS
ip-143-95-226-60.iplocal
Software
nginx/1.16.0 /
Resource Hash
10cebd0c0f6acd425dd9f2002fa182e536553bd88c27b24bef5349610034ba04

Request headers

Referer
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:33:57 GMT
Content-Encoding
gzip
Last-Modified
Sat, 10 Aug 2019 09:22:56 GMT
Server
nginx/1.16.0
Connection
keep-alive
Transfer-Encoding
chunked
Content-Type
application/javascript
Mahdi_1.png
blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/
31 KB
31 KB
Image
General
Full URL
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/Mahdi_1.png
Requested by
Host: code.jquery.com
URL: http://code.jquery.com/jquery.min.js
Protocol
HTTP/1.1
Security
, ,
Server
143.95.226.60 Los Angeles, United States, ASN62729 (ASMALLORANGE1 - A Small Orange LLC, US),
Reverse DNS
ip-143-95-226-60.iplocal
Software
nginx/1.16.0 /
Resource Hash
f94fa1fde7ad44a42ed416919da3c001c4d1f450543071f56105d6c7bef5afdb

Request headers

Referer
http://blairbagley.com/PayPal2017Undetected/cf255f2d129ea58e45a1d782ad8bfae7/M/main.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 11 Aug 2019 19:34:14 GMT
Last-Modified
Sat, 10 Aug 2019 09:22:56 GMT
Server
nginx/1.16.0
Connection
keep-alive
Accept-Ranges
bytes
Content-Length
31956
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

6 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask function| $ function| jQuery function| validate

0 Cookies