Submitted URL: https://web10.z12.web.core.windows.net/
Effective URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4...
Submission Tags: phishing malicious Search All
Submission: On May 14 via api from US

Summary

This website contacted 3 IPs in 3 countries across 2 domains to perform 11 HTTP transactions. The main IP is 51.140.120.226, located in London, United Kingdom and belongs to MICROSOFT-CORP-MSN-AS-BLOCK, US. The main domain is 51.140.120.226.
This is the only time 51.140.120.226 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 52.239.148.1 8075 (MICROSOFT...)
9 51.140.120.226 8075 (MICROSOFT...)
1 104.111.228.123 16625 (AKAMAI-AS)
11 3
Apex Domain
Subdomains
Transfer
1 paypalobjects.com
www.paypalobjects.com
2 KB
1 windows.net
web10.z12.web.core.windows.net
445 B
11 2
Domain Requested by
1 www.paypalobjects.com 51.140.120.226
1 web10.z12.web.core.windows.net
11 2

This site contains no links.

Subject Issuer Validity Valid
*.web.core.windows.net
Microsoft IT TLS CA 2
2020-04-17 -
2022-04-17
2 years crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2020-01-09 -
2022-01-12
2 years crt.sh

This page contains 1 frames:

Primary Page: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Frame ID: 6B1AFC068A270011ECE49BD1D8269497
Requests: 11 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://web10.z12.web.core.windows.net/ Page URL
  2. http://51.140.120.226/paypal/ Page URL
  3. http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZ... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Microsoft-HTTPAPI(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

11
Requests

18 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

3
Countries

115 kB
Transfer

405 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://web10.z12.web.core.windows.net/ Page URL
  2. http://51.140.120.226/paypal/ Page URL
  3. http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
web10.z12.web.core.windows.net/
76 B
445 B
Document
General
Full URL
https://web10.z12.web.core.windows.net/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
52.239.148.1 Seoul, Korea, Republic Of, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
080ab46c078d5dd816fea4047f7e9e17bf5e042c0dd8e25d9632f56c03131cda

Request headers

Host
web10.z12.web.core.windows.net
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Content-Length
76
Content-Type
text/html
Content-MD5
JW4lMxLTkL+5vZCvNiZr5A==
Last-Modified
Wed, 13 May 2020 01:26:24 GMT
Accept-Ranges
bytes
ETag
"0x8D7F6DCA681BB2A"
Server
Windows-Azure-Web/1.0 Microsoft-HTTPAPI/2.0
x-ms-request-id
5ad496ad-601e-0007-544b-2ad2e8000000
x-ms-version
2018-03-28
Date
Thu, 14 May 2020 23:54:49 GMT
Cookie set /
51.140.120.226/paypal/
205 B
619 B
Document
General
Full URL
http://51.140.120.226/paypal/
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
b6578207f2b7c0079882b976477c953a61612a28fdeca3839ad2430b29132c6e

Request headers

Host
51.140.120.226
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Server
Apache/2.4.29 (Ubuntu)
Set-Cookie
PHPSESSID=msp7flle8gv2ncq3nvnkjne58t; path=/
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
199
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Primary Request Login.php
51.140.120.226/paypal/
5 KB
2 KB
Document
General
Full URL
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
d7de01dcd0968a0663992893eba16ed8646999c79d014f395f19f93fcb4caa62

Request headers

Host
51.140.120.226
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://51.140.120.226/paypal/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=msp7flle8gv2ncq3nvnkjne58t
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://51.140.120.226/paypal/

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Server
Apache/2.4.29 (Ubuntu)
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1821
Keep-Alive
timeout=5, max=99
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
jquery-1.9.1.js
51.140.120.226/paypal/assets/js/
262 KB
78 KB
Script
General
Full URL
http://51.140.120.226/paypal/assets/js/jquery-1.9.1.js
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7bd80d06c01c0340c1b9159b9b4a197db882ca18cbac8e9b9aa025e68f998d40

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4185d-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Transfer-Encoding
chunked
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=98
jquery.validate.min.js
51.140.120.226/paypal/assets/js/
21 KB
7 KB
Script
General
Full URL
http://51.140.120.226/paypal/assets/js/jquery.validate.min.js
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
8244de8a4015fa72470e8be9b4203dd6238883d2c5f6a46263521bb5da9e2d70

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"525b-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
6367
jquery.payment.js
51.140.120.226/paypal/assets/js/
18 KB
4 KB
Script
General
Full URL
http://51.140.120.226/paypal/assets/js/jquery.payment.js
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
be95b37feb362dde4041a91a7768a45c97b0105af734ff67228cbfe03d951237

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"4646-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
3788
additional-methods.min.js
51.140.120.226/paypal/assets/js/
17 KB
5 KB
Script
General
Full URL
http://51.140.120.226/paypal/assets/js/additional-methods.min.js
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
393fa2ab0c3d90fb4c65d96eb9240ac527e3553a6c3b5bb4675a852f148c812d

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"42b1-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
4915
jquery.maskedinput.js
51.140.120.226/paypal/assets/js/
10 KB
3 KB
Script
General
Full URL
http://51.140.120.226/paypal/assets/js/jquery.maskedinput.js
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
e6ad5c12a1ad8a9ffcde1e1c2ee42a9590cee19c8e233094da4f117dd2641a7c

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"284e-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
application/javascript
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2647
Valid.UK.js
51.140.120.226/paypal/assets/js/
36 KB
6 KB
Script
General
Full URL
http://51.140.120.226/paypal/assets/js/Valid.UK.js
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7aefd97e32fa89f90ea7c14ce96f1a6b5bd68443d5d7e67c52114dd44f46fbd6

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"9196-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Language
uk
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Type
application/javascript
Keep-Alive
timeout=5, max=99
Content-Length
5788
app.css
51.140.120.226/paypal/assets/css/
32 KB
6 KB
Stylesheet
General
Full URL
http://51.140.120.226/paypal/assets/css/app.css
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
HTTP/1.1
Server
51.140.120.226 London, United Kingdom, ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Apache/2.4.29 (Ubuntu) /
Resource Hash
7822b5da5f2f1b760250f1d4d88971b07128255dd934516dd3f916acbfbac14f

Request headers

Referer
http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 14 May 2020 23:54:50 GMT
Content-Encoding
gzip
Last-Modified
Thu, 16 Jan 2020 12:24:18 GMT
Server
Apache/2.4.29 (Ubuntu)
ETag
"7e08-59c40e76be080-gzip"
Vary
Accept-Encoding
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
5978
paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: 51.140.120.226
URL: http://51.140.120.226/paypal/Login.php?sslchannel=true&sessionid=2zZghPfAJAXn4TVzbQYtjsg3y81ZBfGzZLlHoERT4Vs7M13gP4TI4KH9oZTbNU0UXuE9Gy1yb5o0UJzZ
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
104.111.228.123 , Netherlands, ASN16625 (AKAMAI-AS, US),
Reverse DNS
a104-111-228-123.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Referer
http://51.140.120.226/paypal/assets/css/app.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 14 May 2020 23:54:50 GMT
content-encoding
gzip
x-content-type-options
nosniff
x-check-cacheable
YES
status
200
vary
Accept-Encoding
content-length
1929
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
x-serial
16973
strict-transport-security
max-age=31536000
content-type
image/svg+xml
access-control-allow-origin
*
cache-control
max-age=3600
accept-ranges
bytes
expires
Fri, 15 May 2020 00:54:50 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| $ function| jQuery function| validateForm function| removeEmailError function| removeEmailErrorFocus function| removePasswordError function| removePasswordErrorFocus object| jQuery19104929835196366479

1 Cookies

Domain/Path Name / Value
51.140.120.226/ Name: PHPSESSID
Value: msp7flle8gv2ncq3nvnkjne58t