Is this a "PayPay株式会社" PHISH? Does avast detect?

Re: https://www.phishtank.com/phish_detail.php?phish_id=6655037&frame=details
Re: https://www.shodan.io/host/47.115.6.187
Retirable jQuery

jquery 3.3.1.min Found in -http://47.115.6.187/static/js/jquery-3.3.1.min.js
Vulnerability info:
Low CVE-2019-11358 jQuery before 3.4.0, as used in Drupal, Backdrop CMS, and other products, mishandles jQuery.extend(true, {}, …) because of Object.prototype pollution 123
Medium Regex in its jQuery.htmlPrefilter sometimes may introduce XSS

Cloud is vulnerable: PHP, headers - 7.2.22 (various vulnerabilities found in PHP headers 7.2.22 update/upgrade to 7.5)

This website is flagged as insecure.
66% of the trackers on this site could be protecting you from NSA snooping. Tell to fix it.

All trackers
At least 3 third parties know you are on this webpage.

-image.paypay.ne.jp
-p.dmm.com
-47.115.6.187 -47.115.6.187

Tracker could be tracking safely if this site was secure.

JS errors: File not found: /js/Layerlogin.js

File not found: /js/login.js

TypeError: layer.iframe is not a function
/:841

XSS-DOM Number of sources found: 2
Number of sinks found: 161

Results from scanning URL: -http://47.115.6.187/static/js/header_02-1.js
Number of sources found: 3
Number of sinks found: 2

external link to: Results from scanning URL: -https://craillar.home.ktk.de/ (connection refused HTTP ERROR 500
https://www.shodan.io/host/212.7.160.132)
Number of sources found: 14
Number of sinks found: 3
and another pops up: Results from scanning URL: -https://damienmzmzm.slypage.com/ (connection refused)
Number of sources found: 2
Number of sinks found: 2
(https://www.shodan.io/host/142.147.105.39)

polonus (volunteer 3rd party cold recon website security analyst and website error-hunter)