188.247.134.135 Open in urlscan Pro
188.247.134.135  Malicious Activity! Public Scan

Submitted URL: http://188.247.134.135/Image/com_web_paypal/
Effective URL: http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_T...
Submission: On July 04 via automatic, source phishtank

Summary

This website contacted 2 IPs in 2 countries across 1 domains to perform 6 HTTP transactions. The main IP is 188.247.134.135, located in Bucharest, Romania and belongs to ASSECO-NET, RO. The main domain is 188.247.134.135.
This is the only time 188.247.134.135 was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: PayPal (Financial)

Domain & IP information

IP Address AS Autonomous System
5 188.247.134.135 198099 (ASSECO-NET)
1 198.232.125.113 3257 (GTT-BACKB...)
6 2
Apex Domain
Subdomains
Transfer
1 jquery.com
code.jquery.com
38 KB
6 1
Domain Requested by
1 code.jquery.com 188.247.134.135
6 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
Frame ID: 11841.1
Requests: 6 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/ Page URL
  2. http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Re... Page URL

Page Statistics

6
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

2
Countries

73 kB
Transfer

128 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/ Page URL
  2. http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request 0
  • http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679
  • http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/
Redirect Chain
  • http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679
  • http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/
189 B
189 B
Document
General
Full URL
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) / PHP/5.2.10
Resource Hash
8dfded506400ad7f667607f853d5cb50832b768087c893cf56bd7ebd9ec1d18f

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 04 Jul 2017 15:25:27 GMT
Server
Apache/2.2.8 (CentOS)
Connection
close
X-Powered-By
PHP/5.2.10
Content-Length
189
Content-Type
text/html; charset=UTF-8

Redirect headers

Location
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/
Date
Tue, 04 Jul 2017 15:25:27 GMT
Server
Apache/2.2.8 (CentOS)
Connection
close
Content-Length
365
Content-Type
text/html; charset=iso-8859-1
Primary Request websc-login.php
188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/
1 KB
1 KB
Document
General
Full URL
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) / PHP/5.2.10
Resource Hash
4349e466c4e8a7c71faa2d82d48ceead745bef6c3d382c3e871e8a3ead9cc744

Request headers

Upgrade-Insecure-Requests
1
Referer
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 04 Jul 2017 15:25:27 GMT
Server
Apache/2.2.8 (CentOS)
Connection
close
X-Powered-By
PHP/5.2.10
Content-Length
1077
Content-Type
text/html; charset=UTF-8
main.css
188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/
2 KB
2 KB
Stylesheet
General
Full URL
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/main.css
Requested by
Host: 188.247.134.135
URL: http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) /
Resource Hash
1d9ca1fb34f6343ef6a7fe8ab6ba2f531749bcd79c3bc63de5ae0bd8667b93ed

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 04 Jul 2017 15:25:28 GMT
Last-Modified
Tue, 04 Jul 2017 15:25:27 GMT
Server
Apache/2.2.8 (CentOS)
ETag
"1fc600-79e-5537f7e3667c0"
Content-Type
text/css
Connection
close
Accept-Ranges
bytes
Content-Length
1950
jquery.min.js
code.jquery.com/
94 KB
38 KB
Script
General
Full URL
http://code.jquery.com/jquery.min.js
Requested by
Host: 188.247.134.135
URL: http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
Protocol
HTTP/1.1
Server
198.232.125.113 Los Angeles, United States, ASN3257 (GTT-BACKBONE GTT, DE),
Reverse DNS
113-125-232-198.static.unitasglobal.net
Software
NetDNA-cache/2.2 /
Resource Hash
4b940065e2a67c37e3bd02b23c651f4744a3c219aba2d4fb99a631113494d376

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 04 Jul 2017 15:25:29 GMT
Content-Encoding
gzip
Last-Modified
Fri, 24 Oct 2014 00:16:08 GMT
Server
NetDNA-cache/2.2
ETag
W/"54499a48-1764d"
Vary
Accept-Encoding
X-Cache
HIT
Content-Type
application/javascript; charset=utf-8
Access-Control-Allow-Origin
*
Cache-Control
max-age=315360000, public
Transfer-Encoding
chunked
Connection
keep-alive
Expires
Thu, 31 Dec 2037 23:55:55 GMT
js1.js
188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/
453 B
453 B
Script
General
Full URL
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/js1.js
Requested by
Host: 188.247.134.135
URL: http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) /
Resource Hash
10cebd0c0f6acd425dd9f2002fa182e536553bd88c27b24bef5349610034ba04

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/websc-login.php?Go=_Restore_Start&_Acess_Tooken=d44e0d83ae9364944c08d1f91276f001d44e0d83ae9364944c08d1f91276f001
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 04 Jul 2017 15:25:28 GMT
Last-Modified
Tue, 04 Jul 2017 15:25:27 GMT
Server
Apache/2.2.8 (CentOS)
ETag
"1fc5fc-1c5-5537f7e3667c0"
Content-Type
application/x-javascript
Connection
close
Accept-Ranges
bytes
Content-Length
453
Mahdi_1.png
188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/
31 KB
31 KB
Image
General
Full URL
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/Mahdi_1.png
Requested by
Host: code.jquery.com
URL: http://code.jquery.com/jquery.min.js
Protocol
HTTP/1.1
Server
188.247.134.135 Bucharest, Romania, ASN198099 (ASSECO-NET, RO),
Reverse DNS
135.static.asseco-see.ro
Software
Apache/2.2.8 (CentOS) /
Resource Hash
f94fa1fde7ad44a42ed416919da3c001c4d1f450543071f56105d6c7bef5afdb

Request headers

Referer
http://188.247.134.135/Image/com_web_paypal/2576ce6642c757919b7026b631838679/images/main.css
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) HeadlessChrome/59.0.3071.115 Safari/537.36

Response headers

Date
Tue, 04 Jul 2017 15:25:28 GMT
X-Pad
avoid browser bug
Last-Modified
Tue, 04 Jul 2017 15:25:27 GMT
Server
Apache/2.2.8 (CentOS)
ETag
"1fc5ff-7cd4-5537f7e3667c0"
Content-Type
image/png
Connection
close
Accept-Ranges
bytes
Content-Length
31956

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: PayPal (Financial)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies