beta.competitionplus.com
Open in
urlscan Pro
216.126.197.34
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On June 06 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on May 28th 2020. Valid for: 3 months.
This is the only time beta.competitionplus.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 216.126.197.34 216.126.197.34 | 31863 (DACEN-2) (DACEN-2) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
3 | 104.111.228.123 104.111.228.123 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
9 | 3 |
ASN31863 (DACEN-2, US)
PTR: competitionplus.com
beta.competitionplus.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
competitionplus.com
beta.competitionplus.com |
182 KB |
3 |
paypalobjects.com
www.paypalobjects.com |
126 KB |
1 |
jquery.com
code.jquery.com |
79 KB |
9 | 3 |
Domain | Requested by | |
---|---|---|
5 | beta.competitionplus.com |
beta.competitionplus.com
|
3 | www.paypalobjects.com |
code.jquery.com
|
1 | code.jquery.com |
beta.competitionplus.com
|
9 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
beta.competitionplus.com Let's Encrypt Authority X3 |
2020-05-28 - 2020-08-26 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
www.paypal.com DigiCert SHA2 Extended Validation Server CA |
2020-01-09 - 2022-01-12 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://beta.competitionplus.com/aZ2BAVKa2RtDjL93fBUXFbC43W3EWrCaQs7PZRzt6YMXKtjp7Eq/Secure/Access/PayPal/customer_center/user-635332/
Frame ID: 580DA65159CE678CA4B60F4080B9D952
Requests: 9 HTTP requests in this frame
Screenshot
Detected technologies
Bulma (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]+bulma(?:\.min)?\.css/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
beta.competitionplus.com/aZ2BAVKa2RtDjL93fBUXFbC43W3EWrCaQs7PZRzt6YMXKtjp7Eq/Secure/Access/PayPal/customer_center/user-635332/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bulma.min.css
beta.competitionplus.com/aZ2BAVKa2RtDjL93fBUXFbC43W3EWrCaQs7PZRzt6YMXKtjp7Eq/Secure/Access/PayPal/customer_center/user-635332/assets/ |
155 KB 155 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
beta.competitionplus.com/aZ2BAVKa2RtDjL93fBUXFbC43W3EWrCaQs7PZRzt6YMXKtjp7Eq/Secure/Access/PayPal/customer_center/user-635332/assets/ |
14 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
beta.competitionplus.com/aZ2BAVKa2RtDjL93fBUXFbC43W3EWrCaQs7PZRzt6YMXKtjp7Eq/Secure/Access/PayPal/customer_center/user-635332/assets/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.3.1.js
code.jquery.com/ |
265 KB 79 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Xwanted.js
beta.competitionplus.com/aZ2BAVKa2RtDjL93fBUXFbC43W3EWrCaQs7PZRzt6YMXKtjp7Eq/Secure/Access/PayPal/customer_center/user-635332/assets/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Medium.woff2
www.paypalobjects.com/ui-web/paypal-sans-big/1-0-0/ |
39 KB 39 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Regular.woff2
www.paypalobjects.com/ui-web/paypal-sans-big/1-0-0/ |
38 KB 38 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
PayPalSansBig-Light.woff
www.paypalobjects.com/webstatic/mktg/2014design/font/PP-Sans/ |
48 KB 48 KB |
Font
application/x-font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| spinner function| card0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
beta.competitionplus.com
code.jquery.com
www.paypalobjects.com
104.111.228.123
2001:4de0:ac19::1:b:2a
216.126.197.34
0afe9c000e4f210fc8215e162b4e489990943ca0810dc76e5ff776c44067fc9c
2351bbc39303736cd3a670db10427adc13c256dd6b639f0545bfd104947d3427
4493c40b5070acf0775b2bd9f561bbc6a7cc26a35183647c1b148f86447b70ed
707b984c5c13152e4eaff00bb6000a9e3050a0a086030d2a25525c8dd2bd536e
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
c599c554590d1a336ffcb9627f6caaac34b6228f60e15f5f25454bff38facb7e
caef680ca2ee7f344cf7d5e5d6ed2523fe2241194596a336603137cf350cdabf
d8aa24ecc6cecb1a60515bc093f1c9da38a0392612d9ab8ae0f7f36e6eee1fad
f6550a9c96fae63b790bd48c4f6c2385904311422dba06a3852a6793cf239fb8