paypaaaal.serveftp.com Open in urlscan Pro
34.199.8.144  Malicious Activity! Public Scan

URL: http://paypaaaal.serveftp.com/
Submission: On June 23 via manual from US

Summary

This website contacted 2 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 34.199.8.144, located in Ashburn, United States and belongs to AMAZON-AES - Amazon.com, Inc., US. The main domain is paypaaaal.serveftp.com.
This is the only time paypaaaal.serveftp.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
1 34.199.8.144 14618 (AMAZON-AES)
3 4 94.138.203.100 49126 (AS49126)
2 2
Apex Domain
Subdomains
Transfer
4 washingtonresorthotel.com
www.washingtonresorthotel.com
1 KB
1 serveftp.com
paypaaaal.serveftp.com
619 B
2 2
Domain Requested by
4 www.washingtonresorthotel.com 3 redirects paypaaaal.serveftp.com
1 paypaaaal.serveftp.com
2 2

This site contains no links.

Subject Issuer Validity Valid

This page contains 2 frames:

Primary Page: http://paypaaaal.serveftp.com/
Frame ID: 3787176883C788CB8A0B74D5A103738B
Requests: 1 HTTP requests in this frame

Frame: http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/
Frame ID: BA5C25BD291EE6BAFD91152B535EC08B
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

2
IPs

2
Countries

1 kB
Transfer

1 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel HTTP 301
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/ HTTP 302
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc= HTTP 301
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
paypaaaal.serveftp.com/
778 B
619 B
Document
General
Full URL
http://paypaaaal.serveftp.com/
Protocol
HTTP/1.1
Server
34.199.8.144 Ashburn, United States, ASN14618 (AMAZON-AES - Amazon.com, Inc., US),
Reverse DNS
ec2-34-199-8-144.compute-1.amazonaws.com
Software
Apache /
Resource Hash
62521e925167bed50e3d35379e40262006bafda0e1fc4f8ecc4013de49899b90

Request headers

Host
paypaaaal.serveftp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

Date
Sun, 23 Jun 2019 20:46:20 GMT
Server
Apache
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
395
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html
/
www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/ Frame BA5C
Redirect Chain
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=
  • http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/
0
0
Document
General
Full URL
http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/
Requested by
Host: paypaaaal.serveftp.com
URL: http://paypaaaal.serveftp.com/
Protocol
HTTP/1.1
Server
94.138.203.100 , Turkey, ASN49126 (AS49126, TR),
Reverse DNS
ns1.ihsdnsx36.com
Software
Apache / PleskLin
Resource Hash

Request headers

Host
www.washingtonresorthotel.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Referer
http://paypaaaal.serveftp.com/
Accept-Encoding
gzip, deflate
Cookie
PHPSESSID=9v78gr1epp8repjcfbbjhh8tf7
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Referer
http://paypaaaal.serveftp.com/

Response headers

Date
Sun, 23 Jun 2019 20:46:15 GMT
Server
Apache
Expires
Thu, 19 Nov 1981 08:52:00 GMT
Cache-Control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma
no-cache
X-Powered-By
PleskLin
Keep-Alive
timeout=15, max=97
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html; charset=UTF-8

Redirect headers

Date
Sun, 23 Jun 2019 20:46:15 GMT
Server
Apache
Location
http://www.washingtonresorthotel.com/dokumanlar/ref/go/israel/42f32149d900e28b20da4d708azwezzjzjogzhnzc3zdbizmi3mjiynmi2mzrhyjixntc=/
Content-Length
341
Keep-Alive
timeout=15, max=98
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

paypaaaal.serveftp.com
www.washingtonresorthotel.com
34.199.8.144
94.138.203.100
62521e925167bed50e3d35379e40262006bafda0e1fc4f8ecc4013de49899b90