login.safety-customers-access.com
Open in
urlscan Pro
2606:4700:3036::681c:9d0
Malicious Activity!
Public Scan
Effective URL: https://login.safety-customers-access.com/access/login/paypal/security/index.php?rlneaaiianaeedlmlnltwaatinialaadeablbaddimnnkauwnsederktm...
Submission Tags: phishing malicious Search All
Submission: On January 26 via api from US
Summary
TLS certificate: Issued by CloudFlare Inc ECC CA-2 on January 13th 2020. Valid for: 9 months.
This is the only time login.safety-customers-access.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.115.54 167.89.115.54 | 11377 (SENDGRID) (SENDGRID) | |
1 | 219.83.68.91 219.83.68.91 | 4795 (INDOSATM2...) (INDOSATM2-ID INDOSATM2 ASN) | |
1 9 | 2606:4700:303... 2606:4700:3036::681c:9d0 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 23.210.248.226 23.210.248.226 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
13 | 3 |
ASN11377 (SENDGRID, US)
PTR: o16789115x54.outbound-mail.sendgrid.net
u11911769.ct.sendgrid.net |
ASN4795 (INDOSATM2-ID INDOSATM2 ASN, ID)
PTR: satus.idweb.host
sulawesipost.com |
ASN13335 (CLOUDFLARENET, US)
login.safety-customers-access.com |
ASN16625 (AKAMAI-AS, US)
PTR: a23-210-248-226.deploy.static.akamaitechnologies.com
www.paypalobjects.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
safety-customers-access.com
1 redirects
login.safety-customers-access.com |
92 KB |
4 |
paypalobjects.com
www.paypalobjects.com |
143 KB |
1 |
sulawesipost.com
sulawesipost.com |
255 B |
1 |
sendgrid.net
1 redirects
u11911769.ct.sendgrid.net |
301 B |
13 | 4 |
Domain | Requested by | |
---|---|---|
9 | login.safety-customers-access.com |
1 redirects
login.safety-customers-access.com
|
4 | www.paypalobjects.com |
login.safety-customers-access.com
|
1 | sulawesipost.com | |
1 | u11911769.ct.sendgrid.net | 1 redirects |
13 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sulawesipost.com Let's Encrypt Authority X3 |
2020-01-21 - 2020-04-20 |
3 months | crt.sh |
sni.cloudflaressl.com CloudFlare Inc ECC CA-2 |
2020-01-13 - 2020-10-09 |
9 months | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2019-09-10 - 2020-08-18 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://login.safety-customers-access.com/access/login/paypal/security/index.php?rlneaaiianaeedlmlnltwaatinialaadeablbaddimnnkauwnsederktmtsnzinauuezmedidannztmamenttrkdiwaeutaaanrlenllalazibuiasneindbldsmeedlwannidakumeaae191622923
Frame ID: 893393B0FECB34444BC854F63D8869DE
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u11911769.ct.sendgrid.net/wf/click?upn=x0GOrerwnIDVuNg0pTjo501c4NE8x0-2BlEOT54Q57lWkhsVCFuvjOSmHMif8fP...
HTTP 302
https://sulawesipost.com/.well-known/acme-challenge/aaaa//?id=YW1hbmRhcmVzdGExQG1zbi5jb20= Page URL
-
https://login.safety-customers-access.com/access/login/paypal
HTTP 301
https://login.safety-customers-access.com/access/login/paypal/ Page URL
- https://login.safety-customers-access.com/access/login/paypal/security/index.php?rlneaaiianaeedlmlnltwaatinialaadeablb... Page URL
Detected technologies
LiteSpeed (Web Servers) ExpandDetected patterns
- headers server /^LiteSpeed$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u11911769.ct.sendgrid.net/wf/click?upn=x0GOrerwnIDVuNg0pTjo501c4NE8x0-2BlEOT54Q57lWkhsVCFuvjOSmHMif8fPGH8WEUcK0dTO8hrpP6DVSGQzQUK3jFIugEFWEcmqyDx-2FZ0PmglVUZjVdq-2B-2BnblmJFWdm9yuG4FIkczSNU3jAjYd2A-3D-3D_S6aQ135BGJn-2BtdkoYRorrUXOAD9n6KUtrLEyA-2BKDjZN1omH6gvice8Y9AIFTE49km7-2BLiCSAXqAvBfEhsk8sc190ilrja79-2FdIfOewm5PzAjffuB4rb3xzyQZveURFRmyl4VjGWb6DuPLjcM56jj4j9vUXNnVL4DBUpnlwyCP8-2F-2FRJIkBShR4Dpn2XNnXBU9xEOjdyEiD-2B2-2Fdp3RyXa8V-2FTJXsONYoqjhPt7nE7glESXKHCS1v3cLlhzhsvsn8lC
HTTP 302
https://sulawesipost.com/.well-known/acme-challenge/aaaa//?id=YW1hbmRhcmVzdGExQG1zbi5jb20= Page URL
-
https://login.safety-customers-access.com/access/login/paypal
HTTP 301
https://login.safety-customers-access.com/access/login/paypal/ Page URL
- https://login.safety-customers-access.com/access/login/paypal/security/index.php?rlneaaiianaeedlmlnltwaatinialaadeablbaddimnnkauwnsederktmtsnzinauuezmedidannztmamenttrkdiwaeutaaanrlenllalazibuiasneindbldsmeedlwannidakumeaae191622923 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://u11911769.ct.sendgrid.net/wf/click?upn=x0GOrerwnIDVuNg0pTjo501c4NE8x0-2BlEOT54Q57lWkhsVCFuvjOSmHMif8fPGH8WEUcK0dTO8hrpP6DVSGQzQUK3jFIugEFWEcmqyDx-2FZ0PmglVUZjVdq-2B-2BnblmJFWdm9yuG4FIkczSNU3jAjYd2A-3D-3D_S6aQ135BGJn-2BtdkoYRorrUXOAD9n6KUtrLEyA-2BKDjZN1omH6gvice8Y9AIFTE49km7-2BLiCSAXqAvBfEhsk8sc190ilrja79-2FdIfOewm5PzAjffuB4rb3xzyQZveURFRmyl4VjGWb6DuPLjcM56jj4j9vUXNnVL4DBUpnlwyCP8-2F-2FRJIkBShR4Dpn2XNnXBU9xEOjdyEiD-2B2-2Fdp3RyXa8V-2FTJXsONYoqjhPt7nE7glESXKHCS1v3cLlhzhsvsn8lC HTTP 302
- https://sulawesipost.com/.well-known/acme-challenge/aaaa//?id=YW1hbmRhcmVzdGExQG1zbi5jb20=
- https://login.safety-customers-access.com/access/login/paypal HTTP 301
- https://login.safety-customers-access.com/access/login/paypal/
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
sulawesipost.com/.well-known/acme-challenge/aaaa// Redirect Chain
|
110 B 255 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
login.safety-customers-access.com/access/login/paypal/ Redirect Chain
|
302 B 332 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
index.php
login.safety-customers-access.com/access/login/paypal/security/ |
3 KB 897 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
login.safety-customers-access.com/access/login/paypal/security/style/js/ |
85 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xappx.css
login.safety-customers-access.com/access/login/paypal/security/style/css/ |
108 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
custom.css
login.safety-customers-access.com/access/login/paypal/security/style/css/ |
346 B 234 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin.js
login.safety-customers-access.com/access/login/paypal/security/ |
460 B 309 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
xsecx.js
login.safety-customers-access.com/access/login/paypal/security/style/js/ |
268 B 241 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
monogram@2x.png
www.paypalobjects.com/images/shared/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
login.safety-customers-access.com/access/login/paypal/security/style/css/ |
46 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
48 KB 48 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
46 KB 46 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansSmall-Regular.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
46 KB 47 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial) Generic (Online)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| ChangeCaptcha function| check1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.safety-customers-access.com/ | Name: __cfduid Value: d8556a18093503e0fd455eac791ce93a51580079568 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.safety-customers-access.com
sulawesipost.com
u11911769.ct.sendgrid.net
www.paypalobjects.com
167.89.115.54
219.83.68.91
23.210.248.226
2606:4700:3036::681c:9d0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