www.paypaltransactions.com Open in urlscan Pro
18.232.28.189  Malicious Activity! Public Scan

URL: http://www.paypaltransactions.com/l/391152/2020-12-03/9wvkd8
Submission Tags: phishing malicious Search All
Submission: On October 29 via api from US — Scanned from DE

Form analysis 1 forms found in the DOM

POST http://www.paypaltransactions.com/l/391152/2020-12-03/9wvkd8

<form accept-charset="UTF-8" method="post" action="http://www.paypaltransactions.com/l/391152/2020-12-03/9wvkd8" class="form" id="pardot-form">
  <style type="text/css">
    form.form p label {
      color: #000000;
    }
  </style>
  <p class="form-field  email pd-text required    ">
    <label class="field-label" for="391152_134020pi_391152_134020">Email</label>
    <input type="text" name="391152_134020pi_391152_134020" id="391152_134020pi_391152_134020" value="" class="text" size="30" maxlength="255" onchange="piAjax.auditEmailField(this, 391152, 134020, 216149737);" onfocus="">
  </p>
  <div id="error_for_391152_134020pi_391152_134020" style="display:none"></div>
  <p style="position:absolute; width:190px; left:-9999px; top: -9999px;visibility:hidden;">
    <label for="pi_extra_field">Comments</label>
    <input type="text" name="pi_extra_field" id="pi_extra_field">
  </p>
  <!-- forces IE5-8 to correctly submit UTF8 content  -->
  <input name="_utf8" type="hidden" value="☃">
  <p class="submit">
    <input type="submit" accesskey="s" value="Log In">
  </p>
  <script type="text/javascript">
    //<![CDATA[
    var anchors = document.getElementsByTagName("a");
    for (var i = 0; i < anchors.length; i++) {
      var anchor = anchors[i];
      if (anchor.getAttribute("href") && !anchor.getAttribute("target")) {
        anchor.target = "_top";
      }
    }
    //]]>
  </script>
  <input type="hidden" name="hiddenDependentFields" id="hiddenDependentFields" value="">
</form>

Text Content

Log In

Email



Comments