www.paypal-up.top
Open in
urlscan Pro
103.121.209.160
Malicious Activity!
Public Scan
Submission Tags: phishing malicious Search All
Submission: On July 01 via api from US — Scanned from JP
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on July 1st 2022. Valid for: 3 months.
This is the only time www.paypal-up.top was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: PayPal (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 103.121.209.160 103.121.209.160 | 43959 (XTOM-TOKYO) (XTOM-TOKYO) | |
8 | 2 |
ASN43959 (XTOM-TOKYO, DE)
PTR: 103.121.209.160.static.xtom.com
www.paypal-up.top |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
paypal-up.top
www.paypal-up.top |
145 KB |
0 |
leafmailer.org
Failed
leafmailer.org Failed |
|
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | www.paypal-up.top |
www.paypal-up.top
|
0 | leafmailer.org Failed |
www.paypal-up.top
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
paypal-up.top cPanel, Inc. Certification Authority |
2022-07-01 - 2022-09-29 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.paypal-up.top/mmp/webapps/login.php?country.x=en&locale.x=_
Frame ID: B24F7D0884632F40B63DD69FDB706B61
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
Log in to your ΡαyΡαl accountDetected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login.php
www.paypal-up.top/mmp/webapps/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.paypal-up.top/mmp/webapps/auth/js/ |
94 KB 94 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
error.css
www.paypal-up.top/mmp/webapps/auth/css/ |
7 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
www.paypal-up.top/mmp/webapps/auth/css/login/ |
28 KB 29 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.css
www.paypal-up.top/mmp/webapps/auth/css/ |
4 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
js1.js
www.paypal-up.top/mmp/webapps/auth/js/ |
626 B 947 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-logo-129x32.svg
www.paypal-up.top/mmp/webapps/auth/images/ |
5 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
b.png
leafmailer.org/p1/image/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- leafmailer.org
- URL
- https://leafmailer.org/p1/image/b.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: PayPal (Financial)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery function| validate object| ray1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.paypal-up.top/ | Name: PHPSESSID Value: 2009c8b44ba0d6b31c02cced6abcced8 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
leafmailer.org
www.paypal-up.top
leafmailer.org
103.121.209.160
4b940065e2a67c37e3bd02b23c651f4744a3c219aba2d4fb99a631113494d376
5f4c073b062323868fd31773de4ea33d12d57382d346878074a3510aa4e00a72
8ce84a49877406750d72198074eedcf31f67d050905f53462ab0094cedaa5682
9fd14d5557bb5aa34de80e845735b20fa30da96171eb9b0e5a950f4ef5dec995
b3cc50b9e94bbecaaeb1079b64b8ca50616d1732824964c1cc2c5422627a0ec5
bf185d57a19dd41cf8986688296b7acbab6a9d39c5116082e3ccc40a35124a27
ddb835bc3776dcbc74344a0b6350c6895347c259adbb2ad817a86f7c03584bd3