www.support-uk-cshelp-personal.getit.ink
Open in
urlscan Pro
44.202.59.53
Malicious Activity!
Public Scan
Submission: On November 21 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by E6 on November 21st 2024. Valid for: 3 months.
This is the only time www.support-uk-cshelp-personal.getit.ink was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 44.202.59.53 44.202.59.53 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 | 192.229.221.25 192.229.221.25 | 15133 (EDGECAST) (EDGECAST) | |
6 | 2 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-44-202-59-53.compute-1.amazonaws.com
www.support-uk-cshelp-personal.getit.ink |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
getit.ink
www.support-uk-cshelp-personal.getit.ink |
7 KB |
2 |
paypalobjects.com
www.paypalobjects.com — Cisco Umbrella Rank: 2811 |
5 KB |
6 | 2 |
Domain | Requested by | |
---|---|---|
4 | www.support-uk-cshelp-personal.getit.ink |
www.support-uk-cshelp-personal.getit.ink
|
2 | www.paypalobjects.com |
www.support-uk-cshelp-personal.getit.ink
|
6 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paypal.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
support-uk-cshelp-personal.getit.ink E6 |
2024-11-21 - 2025-02-19 |
3 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2024-06-13 - 2025-06-12 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.support-uk-cshelp-personal.getit.ink/
Frame ID: F4FE92E26DBFC1319CDE94FE72E25A3B
Requests: 6 HTTP requests in this frame
5 Outgoing links
These are links going to different origins than the main page.
Title: Forgot password?
Search URL Search Domain Scan URL
Title: Contact Us
Search URL Search Domain Scan URL
Title: Policy
Search URL Search Domain Scan URL
Title: Updates
Search URL Search Domain Scan URL
Title: Worldwide
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.support-uk-cshelp-personal.getit.ink/ |
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPal%20signin.css
www.support-uk-cshelp-personal.getit.ink/ |
20 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
paypal-mark-color.svg
www.paypalobjects.com/paypal-ui/logos/svg/ |
709 B 847 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sprite_countries_flag6.png
www.support-uk-cshelp-personal.getit.ink/image/ |
1 KB 1 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPal%20signin.js
www.support-uk-cshelp-personal.getit.ink/ |
1 KB 396 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pp32.png
www.paypalobjects.com/webstatic/icon/ |
4 KB 4 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.paypalobjects.com
www.support-uk-cshelp-personal.getit.ink
192.229.221.25
44.202.59.53
679e7e62b81267c93d0778083ae0fd0efe24172ff0ac581835b54165b3d9ed43
8766a4211434d2c318fbfa412ea9633b385ecf1cab6119f8894019d91ed7e027
8d4f6b8b23a5982d53e33deaf218b0e19b5ba3d8b55d7fa226f1072d9f115029
8e1e2d61fda426c6aa6196093bbaadecacac973b37f17fde7dd0bcb3702a0ed7
9e208d404c81e5fc7170c13b8564b1368100d668b2071b16ee14600d08519ac4
c9af74b80cb62f8836a170def32f9b9551ed4570e053b6c80b1a513eff242e50