www.paypaltransactions.com
Open in
urlscan Pro
18.232.28.189
Malicious Activity!
Public Scan
URL:
http://www.paypaltransactions.com/l/391152/2020-12-03/9wvkd8
Submission Tags: phishing malicious Search All
Submission: On October 29 via api from US — Scanned from DE
Submission Tags: phishing malicious Search All
Submission: On October 29 via api from US — Scanned from DE
Form analysis
1 forms found in the DOMPOST http://www.paypaltransactions.com/l/391152/2020-12-03/9wvkd8
<form accept-charset="UTF-8" method="post" action="http://www.paypaltransactions.com/l/391152/2020-12-03/9wvkd8" class="form" id="pardot-form">
<style type="text/css">
form.form p label {
color: #000000;
}
</style>
<p class="form-field email pd-text required ">
<label class="field-label" for="391152_134020pi_391152_134020">Email</label>
<input type="text" name="391152_134020pi_391152_134020" id="391152_134020pi_391152_134020" value="" class="text" size="30" maxlength="255" onchange="piAjax.auditEmailField(this, 391152, 134020, 216149737);" onfocus="">
</p>
<div id="error_for_391152_134020pi_391152_134020" style="display:none"></div>
<p style="position:absolute; width:190px; left:-9999px; top: -9999px;visibility:hidden;">
<label for="pi_extra_field">Comments</label>
<input type="text" name="pi_extra_field" id="pi_extra_field">
</p>
<!-- forces IE5-8 to correctly submit UTF8 content -->
<input name="_utf8" type="hidden" value="☃">
<p class="submit">
<input type="submit" accesskey="s" value="Log In">
</p>
<script type="text/javascript">
//<![CDATA[
var anchors = document.getElementsByTagName("a");
for (var i = 0; i < anchors.length; i++) {
var anchor = anchors[i];
if (anchor.getAttribute("href") && !anchor.getAttribute("target")) {
anchor.target = "_top";
}
}
//]]>
</script>
<input type="hidden" name="hiddenDependentFields" id="hiddenDependentFields" value="">
</form>
Text Content
Log In Email Comments