paypaaaal.serveftp.com
Open in
urlscan Pro
34.199.8.144
Malicious Activity!
Public Scan
Submission: On June 23 via manual from US
Summary
This is the only time paypaaaal.serveftp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 34.199.8.144 34.199.8.144 | 14618 (AMAZON-AES) (AMAZON-AES - Amazon.com) | |
3 4 | 94.138.203.100 94.138.203.100 | 49126 (AS49126) (AS49126) | |
2 | 2 |
ASN14618 (AMAZON-AES - Amazon.com, Inc., US)
PTR: ec2-34-199-8-144.compute-1.amazonaws.com
paypaaaal.serveftp.com |
ASN49126 (AS49126, TR)
PTR: ns1.ihsdnsx36.com
www.washingtonresorthotel.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
washingtonresorthotel.com
3 redirects
www.washingtonresorthotel.com |
1 KB |
1 |
serveftp.com
paypaaaal.serveftp.com |
619 B |
2 | 2 |
Domain | Requested by | |
---|---|---|
4 | www.washingtonresorthotel.com |
3 redirects
paypaaaal.serveftp.com
|
1 | paypaaaal.serveftp.com | |
2 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://paypaaaal.serveftp.com/
Frame ID: 3787176883C788CB8A0B74D5A103738B
Requests: 1 HTTP requests in this frame
Frame:
http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/
Frame ID: BA5C25BD291EE6BAFD91152B535EC08B
Requests: 1 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel HTTP 301
- http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/ HTTP 302
- http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc= HTTP 301
- http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
paypaaaal.serveftp.com/ |
778 B 619 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/ Frame BA5C Redirect Chain
|
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onselectstart object| onselectionchange function| queueMicrotask0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
paypaaaal.serveftp.com
www.washingtonresorthotel.com
34.199.8.144
94.138.203.100
62521e925167bed50e3d35379e40262006bafda0e1fc4f8ecc4013de49899b90