payplticket619482.info Open in urlscan Pro
50.28.104.57  Malicious Activity! Public Scan

Submitted URL: http://payplticket619482.info/
Effective URL: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db5863...
Submission Tags: phishing malicious Search All
Submission: On November 17 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 8 HTTP transactions. The main IP is 50.28.104.57, located in Phoenix, United States and belongs to LIQUIDWEB, US. The main domain is payplticket619482.info.
This is the only time payplticket619482.info was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
4 12 50.28.104.57 53824 (LIQUIDWEB)
8 1
Apex Domain
Subdomains
Transfer
12 payplticket619482.info
payplticket619482.info
81 KB
8 1
Domain Requested by
12 payplticket619482.info 4 redirects payplticket619482.info
8 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Frame ID: 5D0CF018B222D39D5C412907FCCF832E
Requests: 8 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://payplticket619482.info/ HTTP 302
    http://payplticket619482.info/users/userID-84811 HTTP 301
    http://payplticket619482.info/users/userID-84811/ HTTP 302
    http://payplticket619482.info/users/userID-84811/en HTTP 301
    http://payplticket619482.info/users/userID-84811/en/ Page URL
  2. http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c21... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

8
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

80 kB
Transfer

253 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://payplticket619482.info/ HTTP 302
    http://payplticket619482.info/users/userID-84811 HTTP 301
    http://payplticket619482.info/users/userID-84811/ HTTP 302
    http://payplticket619482.info/users/userID-84811/en HTTP 301
    http://payplticket619482.info/users/userID-84811/en/ Page URL
  2. http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://payplticket619482.info/ HTTP 302
  • http://payplticket619482.info/users/userID-84811 HTTP 301
  • http://payplticket619482.info/users/userID-84811/ HTTP 302
  • http://payplticket619482.info/users/userID-84811/en HTTP 301
  • http://payplticket619482.info/users/userID-84811/en/

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
payplticket619482.info/users/userID-84811/en/
Redirect Chain
  • http://payplticket619482.info/
  • http://payplticket619482.info/users/userID-84811
  • http://payplticket619482.info/users/userID-84811/
  • http://payplticket619482.info/users/userID-84811/en
  • http://payplticket619482.info/users/userID-84811/en/
130 B
473 B
Document
General
Full URL
http://payplticket619482.info/users/userID-84811/en/
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
7fd85323308efe03c960d09457d41085216c7a72cf0ffe574763f64b8cd443ad

Request headers

Host
payplticket619482.info
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=57ce0a8326f987b0f20ccc542ed66754
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip
Content-Length
117
Keep-Alive
timeout=5, max=96
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Tue, 17 Nov 2020 07:21:37 GMT
Server
Apache
Location
http://payplticket619482.info/users/userID-84811/en/
Cache-Control
max-age=600
Expires
Tue, 17 Nov 2020 07:31:37 GMT
Content-Length
260
Keep-Alive
timeout=5, max=97
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1
Primary Request season.php
payplticket619482.info/users/userID-84811/en/
20 KB
16 KB
Document
General
Full URL
http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
42bad6bc2715135234c39b77cec9192b3b632097593a79ed23ace05347ac9dbe

Request headers

Host
payplticket619482.info
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Referer
http://payplticket619482.info/users/userID-84811/en/
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Cookie
PHPSESSID=57ce0a8326f987b0f20ccc542ed66754
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Referer
http://payplticket619482.info/users/userID-84811/en/

Response headers

Date
Tue, 17 Nov 2020 07:21:37 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Vary
Accept-Encoding,User-Agent
Content-Encoding
gzip
Content-Length
15568
Keep-Alive
timeout=5, max=95
Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
khawarezmialgo.js
payplticket619482.info/users/userID-84811/en/js/
10 KB
3 KB
Script
General
Full URL
http://payplticket619482.info/users/userID-84811/en/js/khawarezmialgo.js
Requested by
Host: payplticket619482.info
URL: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
18f40ec7eebad0f047ee2cfb0c07766d1914a69b3293c69f1ace52528fe68674

Request headers

Referer
http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Nov 2020 07:21:36 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
2747
Expires
Thu, 17 Dec 2020 07:21:38 GMT
contextualLogin.css
payplticket619482.info/users/userID-84811/en/System/
74 KB
12 KB
Stylesheet
General
Full URL
http://payplticket619482.info/users/userID-84811/en/System/contextualLogin.css
Requested by
Host: payplticket619482.info
URL: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
5f30b9d063e3b1e723874d10ece4e92485ffbb08e1822f7d43550116b0f485d5

Request headers

Referer
http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Nov 2020 07:21:36 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
text/css
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
11740
Expires
Thu, 17 Dec 2020 07:21:38 GMT
jquery-3.2.1.min.js
payplticket619482.info/users/userID-84811/en/js/
85 KB
30 KB
Script
General
Full URL
http://payplticket619482.info/users/userID-84811/en/js/jquery-3.2.1.min.js
Requested by
Host: payplticket619482.info
URL: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
a9cb021d2bf22fd7b002d027be449f491ed1c34928a9d49abb9551cda88ee727

Request headers

Referer
http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Nov 2020 07:21:36 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=94
Content-Length
30402
Expires
Thu, 17 Dec 2020 07:21:38 GMT
login.js
payplticket619482.info/users/userID-84811/en/js/
4 KB
1 KB
Script
General
Full URL
http://payplticket619482.info/users/userID-84811/en/js/login.js
Requested by
Host: payplticket619482.info
URL: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
40018c15ae45f4265cdc58cb3703ecdada5a69990976d2e499ba9f09c5bfab6a

Request headers

Referer
http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Nov 2020 07:21:36 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
869
Expires
Thu, 17 Dec 2020 07:21:38 GMT
plugins.js
payplticket619482.info/users/userID-84811/en/js/
55 KB
15 KB
Script
General
Full URL
http://payplticket619482.info/users/userID-84811/en/js/plugins.js
Requested by
Host: payplticket619482.info
URL: http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
656b81fc8ce755e7cdacde6bcb9e9c2af44902025e0c10cd1ac897ca3945dacb

Request headers

Referer
http://payplticket619482.info/users/userID-84811/en/season.php?country.x=17e14f9b7ea14f9db58633f510c7f8c217e14f9b7ea14f9db58633f510c7f8c2
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Nov 2020 07:21:36 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
application/javascript
Cache-Control
max-age=2592000
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
15247
Expires
Thu, 17 Dec 2020 07:21:38 GMT
cfpp.svg
payplticket619482.info/users/userID-84811/en/css/shared/
5 KB
2 KB
Image
General
Full URL
http://payplticket619482.info/users/userID-84811/en/css/shared/cfpp.svg
Requested by
Host: payplticket619482.info
URL: http://payplticket619482.info/users/userID-84811/en/System/contextualLogin.css
Protocol
HTTP/1.1
Server
50.28.104.57 Phoenix, United States, ASN53824 (LIQUIDWEB, US),
Reverse DNS
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5

Request headers

Referer
http://payplticket619482.info/users/userID-84811/en/System/contextualLogin.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Tue, 17 Nov 2020 07:21:38 GMT
Content-Encoding
gzip
Last-Modified
Tue, 17 Nov 2020 07:21:36 GMT
Server
Apache
Vary
Accept-Encoding,User-Agent
Content-Type
image/svg+xml
Cache-Control
max-age=172800
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
1929
Expires
Thu, 19 Nov 2020 07:21:38 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| trustedTypes object| Aes object| Base64 object| Utf8 string| khawarezmifou string| khawarezmic string| output string| ctrTxt object| _0xfc4d function| $ function| jQuery function| validateEmail function| makeid

1 Cookies

Domain/Path Name / Value
payplticket619482.info/ Name: PHPSESSID
Value: 57ce0a8326f987b0f20ccc542ed66754