jfonseca.com
Open in
urlscan Pro
87.98.221.33
Malicious Activity!
Public Scan
Effective URL: https://jfonseca.com/cd/paypal/clients/suGTwz.php?verification
Submission: On February 02 via manual from CA — Scanned from CA
Summary
TLS certificate: Issued by R3 on November 29th 2021. Valid for: 3 months.
This is the only time jfonseca.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.35 167.89.118.35 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 151.101.66.133 151.101.66.133 | 54113 (FASTLY) (FASTLY) | |
1 1 | 195.201.14.70 195.201.14.70 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 8 | 87.98.221.33 87.98.221.33 | 16276 (OVH) (OVH) | |
1 | 2606:4700::68... 2606:4700::6810:5514 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 4 |
ASN11377 (SENDGRID, US)
PTR: o16789118x35.outbound-mail.sendgrid.net
u511486.ct.sendgrid.net |
ASN24940 (HETZNER-AS, DE)
PTR: radagast.eservices-greece.com
thefilmologists.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
jfonseca.com
1 redirects
jfonseca.com |
34 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 227 |
355 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 584 |
30 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 440 |
25 KB |
1 |
thefilmologists.com
1 redirects
thefilmologists.com |
215 B |
1 |
krxd.net
1 redirects
apiservices.krxd.net — Cisco Umbrella Rank: 17143 |
221 B |
1 |
sendgrid.net
1 redirects
u511486.ct.sendgrid.net |
448 B |
10 | 7 |
Domain | Requested by | |
---|---|---|
8 | jfonseca.com |
1 redirects
jfonseca.com
|
1 | cdnjs.cloudflare.com |
jfonseca.com
|
1 | code.jquery.com |
jfonseca.com
|
1 | cdn.jsdelivr.net |
jfonseca.com
|
1 | thefilmologists.com | 1 redirects |
1 | apiservices.krxd.net | 1 redirects |
1 | u511486.ct.sendgrid.net | 1 redirects |
10 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jfonseca.com R3 |
2021-11-29 - 2022-02-27 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-07-03 - 2022-07-02 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://jfonseca.com/cd/paypal/clients/suGTwz.php?verification
Frame ID: D33859655FFD760B76B91BE4354387F8
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
LoginPage URL History Show full URLs
-
https://u511486.ct.sendgrid.net/ls/click?upn=w1y5z4QPFclDD-2BaOK0XKl2kDelImsDItBZpYiilvNTY-2FrAN7rM4VRTFnECG...
HTTP 302
https://apiservices.krxd.net/click_tracker/track?kxconfid=q7h4cvvm0&kxsiteid=EMAIL&kxadvertiserid=EML_BEX... HTTP 302
https://thefilmologists.com/dse/ HTTP 302
https://jfonseca.com/cd/paypal/?pwd=paypal HTTP 302
https://jfonseca.com/cd/paypal/clients/suGTwz.php?verification Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u511486.ct.sendgrid.net/ls/click?upn=w1y5z4QPFclDD-2BaOK0XKl2kDelImsDItBZpYiilvNTY-2FrAN7rM4VRTFnECGPshwCr5fIi6MezhYBFviGzAfctRKs1Py2Vgt4lDF-2FVnbirkQE4tUlh6Z5NrgYfxUL3xRN6IQws1DANcMU5P8zhj8TUAtplly-2FEZurx9m11KoFrHqZn3JWnKRMwq2Q-2B7MZi-2FjP-2B4IP0TnlQG4MasOTHc0b5gFbZfZCp30mi8WiqXX1N6ea85UeSWMadl-2FejTekyfimbftXFrSJWBwRFz1rEQRjIya-2F7WtCNaHBj0Z1BQUi3gz91f1tDwN-2BXGWU-2F0y1cQBxurbHAwzA7uegh9u5ZIlclg-3D-3DsclF_4NMOHYUav7bMUdQbYjuxdPYUfPjNLexPx7Mr-2BE81is5-2B2ddXi3jyEbW7AjxKdyNI1xqnnLjo2VFqRHtvNw939m5wNx56joPYkiG5V86ptJ2dzTsxrYUjNr0Ip3nLZm3t1o1MNzghUxsMzS-2BFPGPrqW-2BtUFfc1YespWMa3-2BhUt1xvVAKR5f5VOAPoxIFV-2Fem51i4vcTPRMsD2gFPNPJlASw-3D-3D
HTTP 302
https://apiservices.krxd.net/click_tracker/track?kxconfid=q7h4cvvm0&kxsiteid=EMAIL&kxadvertiserid=EML_BEX&kxcampaignid=AP_FR_CONF-AVRIL21-CRM_vn_Brand_PSABRA_Information_EML_BEX_C_VI&kxadid=visuelP&clk=https%3A%2F%2Fthefilmologists.com%2Fdse%2F HTTP 302
https://thefilmologists.com/dse/ HTTP 302
https://jfonseca.com/cd/paypal/?pwd=paypal HTTP 302
https://jfonseca.com/cd/paypal/clients/suGTwz.php?verification Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
suGTwz.php
jfonseca.com/cd/paypal/clients/ Redirect Chain
|
2 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@4.5.3/dist/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
helpers.css
jfonseca.com/cd/paypal/assets/css/ |
41 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
jfonseca.com/cd/paypal/assets/css/ |
8 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
jfonseca.com/cd/paypal/assets/imgs/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
jfonseca.com/cd/paypal/assets/js/ |
61 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.min.js
cdnjs.cloudflare.com/ajax/libs/font-awesome/5.15.1/js/ |
1 MB 355 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
jfonseca.com/cd/paypal/assets/js/ |
23 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
script.js
jfonseca.com/cd/paypal/assets/js/ |
0 310 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery number| uidEvent object| bootstrap object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jfonseca.com/ | Name: PHPSESSID Value: uet2l12fb929hsl4u0o76mlml3 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
apiservices.krxd.net
cdn.jsdelivr.net
cdnjs.cloudflare.com
code.jquery.com
jfonseca.com
thefilmologists.com
u511486.ct.sendgrid.net
151.101.66.133
167.89.118.35
195.201.14.70
2001:4de0:ac18::1:a:2a
2606:4700::6810:125e
2606:4700::6810:5514
87.98.221.33
0448acf8483bd81b69723d2135d437e1ea6e8ad8211473f0b002548154e7661f
09009a660b742365380daf9d085da4b18ae325390d90ed76ae683cad4b810378
20a3ef6979bbe5e4de1afaecc703e1d34cbc5e3ceab36d378539506327692d72
2909d4fa86cf09191e768576e1a6eab7f2635a2627549c45d29595ffac9c0da9
8ac5189e7fc963521f8e3b891b3f65937c2aedd88a321ba60d89e9e7d40c404a
a199620fe981df00a825f78761d3f7c8870f8117daa4a890e08018dec386dae8
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f77c0d1739b618edc4a01ca3f6b2990b01a3009030af49ee8cf68e83052df194
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
f839760d1621714efedeb3eb08b25e619812dcc33d77aceb0daf405ac727a765