www.paypal.id.secure-sign-in.gq Open in urlscan Pro
51.159.0.138  Malicious Activity! Public Scan

URL: https://www.paypal.id.secure-sign-in.gq/signin/?country.x=US&locale.x=_
Submission: On August 08 via automatic, source phishtank

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 4 HTTP transactions. The main IP is 51.159.0.138, located in Paris, France and belongs to AS12876, FR. The main domain is www.paypal.id.secure-sign-in.gq.
TLS certificate: Issued by cPanel, Inc. Certification Authority on August 8th 2019. Valid for: 3 months.
This is the only time www.paypal.id.secure-sign-in.gq was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
2 51.159.0.138 12876 (AS12876)
1 2.18.232.222 16625 (AKAMAI-AS)
4 3
Domain Requested by
2 www.paypal.id.secure-sign-in.gq www.paypal.id.secure-sign-in.gq
1 www.paypalobjects.com www.paypal.id.secure-sign-in.gq
0 code.jquery.com Failed www.paypal.id.secure-sign-in.gq
4 3

This site contains no links.

Subject Issuer Validity Valid
paypal.id.secure-sign-in.gq
cPanel, Inc. Certification Authority
2019-08-08 -
2019-11-06
3 months crt.sh
www.paypal.com
DigiCert SHA2 Extended Validation Server CA
2018-08-14 -
2020-08-18
2 years crt.sh

This page contains 1 frames:

Primary Page: https://www.paypal.id.secure-sign-in.gq/signin/?country.x=US&locale.x=_
Frame ID: AF95BD26749742458C1FE226D1EC49E7
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^\/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

4
Requests

75 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

30 kB
Transfer

32 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
www.paypal.id.secure-sign-in.gq/signin/
3 KB
3 KB
Document
General
Full URL
https://www.paypal.id.secure-sign-in.gq/signin/?country.x=US&locale.x=_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
51.159.0.138 Paris, France, ASN12876 (AS12876, FR),
Reverse DNS
vapehost.cc
Software
Apache /
Resource Hash
aa31c9ed2886e0feff87cd9955c797eb8eb9cb212e66a732e7381a91a09b57dd

Request headers

Host
www.paypal.id.secure-sign-in.gq
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Date
Thu, 08 Aug 2019 20:32:42 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate
Pragma
no-cache
Set-Cookie
PHPSESSID=3967e62e7f1e9271b10f697b228acb6a; path=/
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8
style.css
www.paypal.id.secure-sign-in.gq/css/
24 KB
25 KB
Stylesheet
General
Full URL
https://www.paypal.id.secure-sign-in.gq/css/style.css
Requested by
Host: www.paypal.id.secure-sign-in.gq
URL: https://www.paypal.id.secure-sign-in.gq/signin/?country.x=US&locale.x=_
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
51.159.0.138 Paris, France, ASN12876 (AS12876, FR),
Reverse DNS
vapehost.cc
Software
Apache /
Resource Hash
562e585efab210b7cbdb49a5f72814f7d561486e7368159e1ef38531d38afc88

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.paypal.id.secure-sign-in.gq/signin/?country.x=US&locale.x=_
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Thu, 08 Aug 2019 20:32:42 GMT
Last-Modified
Sun, 20 Dec 2015 23:07:52 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=99
Content-Length
25054
jquery-2.1.4.min.js
code.jquery.com/
0
0

paypal-logo-129x32.svg
www.paypalobjects.com/images/shared/
5 KB
2 KB
Image
General
Full URL
https://www.paypalobjects.com/images/shared/paypal-logo-129x32.svg
Requested by
Host: www.paypal.id.secure-sign-in.gq
URL: https://www.paypal.id.secure-sign-in.gq/signin/?country.x=US&locale.x=_
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2.18.232.222 , Ascension Island, ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US),
Reverse DNS
a2-18-232-222.deploy.static.akamaitechnologies.com
Software
Apache /
Resource Hash
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff

Request headers

Sec-Fetch-Mode
no-cors
Referer
https://www.paypal.id.secure-sign-in.gq/css/style.css
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

date
Thu, 08 Aug 2019 20:32:43 GMT
content-encoding
gzip
x-content-type-options
nosniff
last-modified
Fri, 24 Oct 2014 22:52:57 GMT
server
Apache
status
200
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
strict-transport-security
max-age=31536000
accept-ranges
bytes
content-length
1929
expires
Sat, 07 Sep 2019 20:32:43 GMT

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
code.jquery.com
URL
http://code.jquery.com/jquery-2.1.4.min.js

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
www.paypal.id.secure-sign-in.gq/ Name: PHPSESSID
Value: 3967e62e7f1e9271b10f697b228acb6a