www.paakatapp.ir
Open in
urlscan Pro
88.99.232.8
Malicious Activity!
Public Scan
Submission: On May 26 via automatic, source openphish
Summary
TLS certificate: Issued by R3 on April 25th 2021. Valid for: 3 months.
This is the only time www.paakatapp.ir was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: 1&1 Ionos (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 88.99.232.8 88.99.232.8 | 24940 (HETZNER-AS) (HETZNER-AS) | |
6 | 213.165.66.58 213.165.66.58 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 | 74.208.255.201 74.208.255.201 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
8 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
uicdn.net
ce1.uicdn.net |
285 KB |
1 |
ionos.com
mail.ionos.com |
8 KB |
1 |
paakatapp.ir
www.paakatapp.ir |
18 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | ce1.uicdn.net |
www.paakatapp.ir
ce1.uicdn.net |
1 | mail.ionos.com |
www.paakatapp.ir
|
1 | www.paakatapp.ir | |
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mail.paakatapp.ir R3 |
2021-04-25 - 2021-07-24 |
3 months | crt.sh |
ce1.uicdn.net GeoTrust RSA CA 2018 |
2020-03-03 - 2022-03-08 |
2 years | crt.sh |
mail.ionos.com GeoTrust EV RSA CA 2018 |
2020-11-05 - 2021-11-08 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.paakatapp.ir/b/login/?id=2327&utm_term=2327&utm_campaign=m
Frame ID: A09DBE953B4174D8CE55882CD16DA0C6
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
www.paakatapp.ir/b/login/ |
17 KB 18 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ionos.min.css
ce1.uicdn.net/exos/framework/1.1/ |
189 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
login.min.css
mail.ionos.com/css/ |
15 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
exos-icon-font.woff
ce1.uicdn.net/exos/icons/ |
48 KB 48 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 63 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-regular.woff
ce1.uicdn.net/exos/fonts/overpass/ |
42 KB 42 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-bold.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 62 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-bold.woff
ce1.uicdn.net/exos/fonts/overpass/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: 1&1 Ionos (Telecommunication)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.paakatapp.ir/ | Name: PHPSESSID Value: b58e0f4a2eac538854f88541b58dc77a |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ce1.uicdn.net
mail.ionos.com
www.paakatapp.ir
213.165.66.58
74.208.255.201
88.99.232.8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