00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com
Open in
urlscan Pro
2a00:1450:4001:817::2013
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On August 19 via api from US
Summary
This is the only time 00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2a00:1450:400... 2a00:1450:4001:817::2013 | 15169 (GOOGLE) (GOOGLE) | |
9 | 104.111.228.123 104.111.228.123 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 88.221.142.62 88.221.142.62 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
11 | 3 |
ASN15169 (GOOGLE, US)
00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-111-228-123.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
ASN16625 (AKAMAI-AS, US)
PTR: a88-221-142-62.deploy.static.akamaitechnologies.com
t.paypal.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
paypalobjects.com
www.paypalobjects.com |
396 KB |
1 |
paypal.com
t.paypal.com |
778 B |
1 |
htmlcomponentservice.com
00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com |
41 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
9 | www.paypalobjects.com |
00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com
www.paypalobjects.com |
1 | t.paypal.com | |
1 | 00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com | |
11 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.paypal.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
t.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com/get_draft?id=99ea0e_8eddaa8b0b3b6316a653bbd03eb5b48f.html
Frame ID: CF3DBA9AA11E7987B936C89AD3234EB6
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Google App Engine (Web Servers) ExpandDetected patterns
- headers server /Google Frontend/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Help & Contact
Search URL Search Domain Scan URL
Title: Security
Search URL Search Domain Scan URL
Title: Privacy
Search URL Search Domain Scan URL
Title: Legal
Search URL Search Domain Scan URL
Title: Policy updates
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
get_draft
00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com/ |
182 KB 41 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Regular.woff2
www.paypalobjects.com/digitalassets/c/paypal-ui/fonts/ |
18 KB 18 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Light.woff2
www.paypalobjects.com/digitalassets/c/paypal-ui/fonts/ |
18 KB 18 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fonts-and-normalize.min.css
www.paypalobjects.com/digitalassets/c/paypal-ui/web/fonts-and-normalize/0-0-12/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ppvx-app.css
www.paypalobjects.com/web/res/aa2/42a8db1881a413a2e97fc9f33edcc/css/ |
162 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xhr-ads.min.js
www.paypalobjects.com/web/res/aa2/42a8db1881a413a2e97fc9f33edcc/js/vendor/ |
16 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pa.js
www.paypalobjects.com/pa/js/min/ |
46 KB 17 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ic_arrow.svg
www.paypalobjects.com/images/Cause/CampaignPage/ |
1 KB 743 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
router.js
www.paypalobjects.com/web/res/aa2/42a8db1881a413a2e97fc9f33edcc/js/apps/ |
1 MB 311 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo_paypal_106x27.png
www.paypalobjects.com/webstatic/logo/ |
1 KB 2 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ts
t.paypal.com/ |
42 B 778 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| trustedTypes object| PAYPAL object| fpti string| fptiserverurl object| _ifpti object| webpackJsonp function| setImmediate function| clearImmediate object| core object| regeneratorRuntime object| React object| ReactDOM function| _0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
00c85b59-4f3f-4376-8b3d-de07cf5249d3.htmlcomponentservice.com
t.paypal.com
www.paypalobjects.com
104.111.228.123
2a00:1450:4001:817::2013
88.221.142.62
2de99d55538114324b745e8bd58f76794b9feee97093ff2c25a8555b81fe4c73
3a752933d47733e28ec1f0e478af45addf350f513f71b449cc992c1068278e46
4c87841ac3886e0723b1ab2b4f9faa957baecb58e34b3b507ccf1233a2fbe350
6d8ba81d1b60a18707722a1f2b62dad48a6acced95a1933f49a68b5016620b93
9bf1d3beb02d8b497e4a2f5faf990d231121a6a66cfc5529b4a6971b7a4d744c
af93d1d952b2dc42c029871cbbb92988835b31c86d4f0cb6a9674b1d1714a20f
be5ab4660edfad6efd2634f62d6461e696660eb6bed842ca068997ec743ce6e2
c130e32be5fc8988a3075c62e61ed24103ca35da7ef9a0b1172fd5deaa41a443
dac226e7cc7f0d0a9e61a867f99a7e97876fe02360baa0327965f8c29d14e528
eb9c107142ec1f614988a658c581a606273daf5dca27c0af32fc9db62de351f7