paypal-login.yhlvbo.com
Open in
urlscan Pro
155.94.141.124
Malicious Activity!
Public Scan
Effective URL: https://paypal-login.yhlvbo.com/index.html
Submission: On January 20 via api from JP — Scanned from JP
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on January 14th 2022. Valid for: a year.
This is the only time paypal-login.yhlvbo.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 13 | 155.94.141.124 155.94.141.124 | 8100 (ASN-QUADR...) (ASN-QUADRANET-GLOBAL) | |
1 | 23.10.3.27 23.10.3.27 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
12 | 2 |
ASN8100 (ASN-QUADRANET-GLOBAL, US)
PTR: 155.94.141.124.static.quadranet.com
paypal-login.yhlvbo.com |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-10-3-27.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
yhlvbo.com
2 redirects
paypal-login.yhlvbo.com |
143 KB |
1 |
paypalobjects.com
www.paypalobjects.com — Cisco Umbrella Rank: 1385 |
2 KB |
12 | 2 |
Domain | Requested by | |
---|---|---|
13 | paypal-login.yhlvbo.com |
2 redirects
paypal-login.yhlvbo.com
|
1 | www.paypalobjects.com |
paypal-login.yhlvbo.com
|
12 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
paypal-login.yhlvbo.com Sectigo RSA Domain Validation Secure Server CA |
2022-01-14 - 2023-01-14 |
a year | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2021-11-03 - 2022-10-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://paypal-login.yhlvbo.com/index.html
Frame ID: 0B560F329A0E0E10F6AB863362A96B92
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
paypalPage URL History Show full URLs
-
https://paypal-login.yhlvbo.com/
HTTP 302
https://paypal-login.yhlvbo.com/fanghong/api/jump.php HTTP 302
https://paypal-login.yhlvbo.com/index.html Page URL
Detected technologies
PayPal (Payment Processors) ExpandDetected patterns
- paypalobjects\.com
Vue.js (JavaScript Frameworks) Expand
Detected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://paypal-login.yhlvbo.com/
HTTP 302
https://paypal-login.yhlvbo.com/fanghong/api/jump.php HTTP 302
https://paypal-login.yhlvbo.com/index.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
paypal-login.yhlvbo.com/ Redirect Chain
|
935 B 544 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.f28015d4.js
paypal-login.yhlvbo.com/js/ |
5 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.9cfa36b4.js
paypal-login.yhlvbo.com/js/ |
141 KB 49 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-01bce90e.ca3cbff4.css
paypal-login.yhlvbo.com/css/ |
0 19 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-d63feb2e.8eadd3e9.css
paypal-login.yhlvbo.com/css/ |
0 2 KB |
Other
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-01bce90e.3059c52d.js
paypal-login.yhlvbo.com/js/ |
0 9 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-3821c6c2.9d3bb7a7.js
paypal-login.yhlvbo.com/js/ |
0 11 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-d63feb2e.613d0338.js
paypal-login.yhlvbo.com/js/ |
0 11 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-3821c6c2.9d3bb7a7.js
paypal-login.yhlvbo.com/js/ |
30 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-01bce90e.ca3cbff4.css
paypal-login.yhlvbo.com/css/ |
128 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-01bce90e.3059c52d.js
paypal-login.yhlvbo.com/js/ |
35 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/ |
5 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackJsonp1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
paypal-login.yhlvbo.com/ | Name: PHPSESSID Value: smt37ov948vitibne0nle8vhn6 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paypal-login.yhlvbo.com
www.paypalobjects.com
155.94.141.124
23.10.3.27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