www.airlakeairport.net Open in urlscan Pro
2606:4700:3035::681f:5a8a  Malicious Activity! Public Scan

URL: http://www.airlakeairport.net/paypal-update/-/
Submission Tags: phishing malicious Search All
Submission: On May 13 via api from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 5 HTTP transactions. The main IP is 2606:4700:3035::681f:5a8a, located in United States and belongs to CLOUDFLARENET, US. The main domain is www.airlakeairport.net.
This is the only time www.airlakeairport.net was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 4 2606:4700:303... 13335 (CLOUDFLAR...)
2 151.101.114.133 54113 (FASTLY)
5 2
Apex Domain
Subdomains
Transfer
4 airlakeairport.net
www.airlakeairport.net
29 KB
2 paypalobjects.com
www.paypalobjects.com
7 KB
5 2
Domain Requested by
4 www.airlakeairport.net 1 redirects www.airlakeairport.net
2 www.paypalobjects.com www.airlakeairport.net
5 2

This site contains no links.

Subject Issuer Validity Valid
www.paypalobjects.com
DigiCert SHA2 Extended Validation Server CA
2019-12-09 -
2021-12-13
2 years crt.sh

This page contains 1 frames:

Primary Page: http://www.airlakeairport.net/paypal-update/-/
Frame ID: 122042ADCEEB65FCBA8112C7684D2A96
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://www.airlakeairport.net/paypal-update/- HTTP 301
    http://www.airlakeairport.net/paypal-update/-/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^cloudflare$/i

Overall confidence: 100%
Detected patterns
  • script /([\d.]+)?\/modernizr(?:.([\d.]+))?.*\.js/i

Page Statistics

5
Requests

40 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

35 kB
Transfer

134 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://www.airlakeairport.net/paypal-update/- HTTP 301
    http://www.airlakeairport.net/paypal-update/-/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.airlakeairport.net/paypal-update/-/
Redirect Chain
  • http://www.airlakeairport.net/paypal-update/-
  • http://www.airlakeairport.net/paypal-update/-/
23 KB
7 KB
Document
General
Full URL
http://www.airlakeairport.net/paypal-update/-/
Protocol
HTTP/1.1
Server
2606:4700:3035::681f:5a8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
61b8f0e2d21b908df27f4bdeb12d5faa4c3fe9d1daeda40ae9ea1cf32e3d6f4d
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
www.airlakeairport.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
__cfduid=d3780aa20f236ad602ac698ee67ea7ce31589340535
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 13 May 2020 03:28:55 GMT
Content-Type
text/html; charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Vary
Accept-Encoding
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
CF-Cache-Status
DYNAMIC
Server
cloudflare
CF-RAY
59294acc18541782-FRA
Content-Encoding
gzip
cf-request-id
02adad138e000017820d92c200000001

Redirect headers

Date
Wed, 13 May 2020 03:28:55 GMT
Content-Type
text/html
Transfer-Encoding
chunked
Connection
keep-alive
Set-Cookie
__cfduid=d3780aa20f236ad602ac698ee67ea7ce31589340535; expires=Fri, 12-Jun-20 03:28:55 GMT; path=/; domain=.airlakeairport.net; HttpOnly; SameSite=Lax
Location
http://www.airlakeairport.net/paypal-update/-/
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
X-Frame-Options
SAMEORIGIN
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
CF-Cache-Status
DYNAMIC
Server
cloudflare
CF-RAY
59294acbe8161782-FRA
cf-request-id
02adad1370000017820d929200000001
contextualLogin.css
www.airlakeairport.net/paypal-update/-/Log%20in%20to%20your%20PayPal%20account_files/
98 KB
17 KB
Stylesheet
General
Full URL
http://www.airlakeairport.net/paypal-update/-/Log%20in%20to%20your%20PayPal%20account_files/contextualLogin.css
Requested by
Host: www.airlakeairport.net
URL: http://www.airlakeairport.net/paypal-update/-/
Protocol
HTTP/1.1
Server
2606:4700:3035::681f:5a8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
c1a148a87b8a7dcf84e0759c4be59ef8626979bdc9cc3a3e9a10e00d7aa4eec0
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.airlakeairport.net/paypal-update/-/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 13 May 2020 03:28:55 GMT
Content-Encoding
gzip
X-Content-Type-Options
nosniff
CF-Cache-Status
HIT
Age
11094
Transfer-Encoding
chunked
Connection
keep-alive
X-XSS-Protection
1; mode=block
Last-Modified
Wed, 13 May 2020 00:24:01 GMT
Server
cloudflare
X-Frame-Options
SAMEORIGIN
ETag
W/"5ebb3e21-18639"
Vary
Accept-Encoding
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
text/css
Cache-Control
max-age=31536000
cf-request-id
02adad13aa000017820d92d200000001
CF-RAY
59294acc488b1782-FRA
Expires
Thu, 13 May 2021 00:24:01 GMT
modernizr-2.6.1.js.download
www.airlakeairport.net/paypal-update/-/Log%20in%20to%20your%20PayPal%20account_files/
4 KB
4 KB
Script
General
Full URL
http://www.airlakeairport.net/paypal-update/-/Log%20in%20to%20your%20PayPal%20account_files/modernizr-2.6.1.js.download
Requested by
Host: www.airlakeairport.net
URL: http://www.airlakeairport.net/paypal-update/-/
Protocol
HTTP/1.1
Server
2606:4700:3035::681f:5a8a , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a6c3bff965978df8093c3a29f7071c21d7439a212af41e7b40ce70d94d6bcc44
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
http://www.airlakeairport.net/paypal-update/-/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Wed, 13 May 2020 03:28:55 GMT
X-Content-Type-Options
nosniff
CF-Cache-Status
DYNAMIC
Last-Modified
Wed, 13 May 2020 03:25:16 GMT
Server
cloudflare
X-Frame-Options
SAMEORIGIN
ETag
"5ebb689c-edf"
Strict-Transport-Security
max-age=31536000; includeSubDomains; preload
Content-Type
application/octet-stream
X-XSS-Protection
1; mode=block
Connection
keep-alive
Accept-Ranges
bytes
CF-RAY
59294acc4da7d6ed-FRA
Content-Length
3807
cf-request-id
02adad13af0000d6ed8c149200000001
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: www.airlakeairport.net
URL: http://www.airlakeairport.net/paypal-update/-/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Referer
http://www.airlakeairport.net/paypal-update/-/Log%20in%20to%20your%20PayPal%20account_files/contextualLogin.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 03:28:55 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
4607718
x-cache
HIT, HIT
status
200
surrorage-key
/images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared/paypal-logo-129x32.svg /images/shared /images
vary
Accept-Encoding
content-length
1929
via
1.1 varnish, 1.1 varnish
x-served-by
cache-lax8645-LAX, cache-hhn4044-HHN
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
x-timer
S1589340536.949451,VS0,VE0
strict-transport-security
max-age=31557600
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
173263, 229858
fingerprint-paypal.png
www.paypalobjects.com/images/shared/
5 KB
5 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/fingerprint-paypal.png
Requested by
Host: www.airlakeairport.net
URL: http://www.airlakeairport.net/paypal-update/-/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
151.101.114.133 Frankfurt am Main, Germany, ASN54113 (FASTLY, US),
Reverse DNS
Software
Apache /
Resource Hash
8356ff3eb802d52db40a1714aee50ae9ae36aa6e3d789aae7126a53c620156dd
Security Headers
Name Value
Strict-Transport-Security max-age=31557600
X-Content-Type-Options nosniff

Request headers

Referer
http://www.airlakeairport.net/paypal-update/-/Log%20in%20to%20your%20PayPal%20account_files/contextualLogin.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Wed, 13 May 2020 03:28:55 GMT
via
1.1 varnish, 1.1 varnish
x-content-type-options
nosniff
age
4607705
x-cache
HIT, HIT
status
200
surrorage-key
/images/shared/fingerprint-paypal.png /images/shared/fingerprint-paypal.png /images/shared/fingerprint-paypal.png /images/shared/fingerprint-paypal.png /images/shared/fingerprint-paypal.png /images/shared/fingerprint-paypal.png /images/shared/fingerprint-paypal.png /images/shared /images
content-length
4650
x-served-by
cache-sjc10048-SJC, cache-hhn4044-HHN
last-modified
Tue, 13 Jun 2017 03:49:56 GMT
server
Apache
x-timer
S1589340536.949436,VS0,VE0
strict-transport-security
max-age=31557600
content-type
image/png
cache-control
max-age=3600
accept-ranges
bytes
x-cache-hits
1, 55346

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

1 Cookies

Domain/Path Name / Value
.airlakeairport.net/ Name: __cfduid
Value: d3780aa20f236ad602ac698ee67ea7ce31589340535

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block