box2038.temp.domains
Open in
urlscan Pro
74.220.219.246
Malicious Activity!
Public Scan
Effective URL: http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/secure.php?token=d749a9345b76c8a91f308833f0cab7f8
Submission Tags: phishing malicious Search All
Submission: On April 13 via api from US
Summary
This is the only time box2038.temp.domains was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 7 | 74.220.219.246 74.220.219.246 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
5 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: box2038.bluehost.com
box2038.temp.domains |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
temp.domains
2 redirects
box2038.temp.domains |
159 KB |
5 | 1 |
Domain | Requested by | |
---|---|---|
7 | box2038.temp.domains |
2 redirects
box2038.temp.domains
|
5 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/secure.php?token=d749a9345b76c8a91f308833f0cab7f8
Frame ID: 170F0802D0257F8C35D4903F1FF100DD
Requests: 5 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form
HTTP 301
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/ HTTP 302
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/secure.php?token=d749a9345b7... Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form
HTTP 301
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/ HTTP 302
http://box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/secure.php?token=d749a9345b76c8a91f308833f0cab7f8 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
secure.php
box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/form/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.css
box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lock.gif
box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/img/ |
114 KB 114 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
effect.js
box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/js/ |
87 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoP.PNG
box2038.temp.domains/~impotssr/fr-intl.pay.pal2021/login/websrc/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
box2038.temp.domains/ | Name: PHPSESSID Value: 457cb84b190dc26c2fde0a1f859ee919 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
box2038.temp.domains
74.220.219.246
20caf1d69148b17737ab3af8b3d9b8d821e7a6572d8c304561cfd3096152952b
6428bbee9e440ef25cd7b91d6e5debfb62159f4aa6374fdd0452e38420a53b13
d106a2a257150e602c55279e0e932dc4fb9424c9a8fd68454deb7560c49ae36c
e06ea087a8af5a81de6e9cdfc00b128cb71c24f5638adf36f4516b86f13444cf
e2c6268c250382105e56b7bfc4b894a7bb4b254f467c1557abd58e310f900623