wedlake.ca
Open in
urlscan Pro
192.99.34.158
Malicious Activity!
Public Scan
Submission: On November 20 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 25th 2018. Valid for: 3 months.
This is the only time wedlake.ca was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: CapitalOne (Financial)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 192.99.34.158 192.99.34.158 | 16276 (OVH) (OVH) | |
1 | 205.185.208.52 205.185.208.52 | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
2 | 2606:4700::68... 2606:4700::6810:5914 | 13335 (CLOUDFLAR...) (CLOUDFLARENET - Cloudflare) | |
13 | 3 |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
PTR: vip052.ssl.hwcdn.net
code.jquery.com |
ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US)
cdn.jsdelivr.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
wedlake.ca
wedlake.ca |
135 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net |
13 KB |
1 |
jquery.com
code.jquery.com |
38 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
10 | wedlake.ca |
wedlake.ca
code.jquery.com |
2 | cdn.jsdelivr.net |
wedlake.ca
|
1 | code.jquery.com |
wedlake.ca
|
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
wedlake.ca cPanel, Inc. Certification Authority |
2018-10-25 - 2019-01-23 |
3 months | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
ssl363648.cloudflaressl.com COMODO ECC Domain Validation Secure Server CA 2 |
2018-10-27 - 2019-05-05 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/step3.php?cmd=login_submit&id=2a2d727ca6335f7ea5614a2e18aeac522a2d727ca6335f7ea5614a2e18aeac52&session=2a2d727ca6335f7ea5614a2e18aeac522a2d727ca6335f7ea5614a2e18aeac52
Frame ID: A869BADB453BBA185F68726D32483F6A
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery(?:\-|\.)([\d.]*\d)[^\/]*\.js/i
- script /jquery.*\.js/i
- env /^jQuery$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
step3.php
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/ |
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-3f627e3dc2.css
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/index_files/ |
115 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
capitalone-logo.png
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/index_files/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
9.gif
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/images/ |
13 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8.gif
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/images/ |
14 KB 14 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7.gif
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/images/ |
21 KB 21 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.11.1.min.js
code.jquery.com/ |
94 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
jquery.validate.min.js
cdn.jsdelivr.net/jquery.validation/1.16.0/ |
23 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
additional-methods.min.js
cdn.jsdelivr.net/jquery.validation/1.16.0/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
drop-icon.png
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/images/ |
8 KB 8 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Cookie set
ProximaNovaRegular.woff2
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNovaSemiBold.woff2
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/fonts/ |
20 KB 20 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ProximaNovaRegular.woff
wedlake.ca/capenwan/b651507ed468066fddcebfa14c6ecbf9/fonts/ |
24 KB 24 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: CapitalOne (Financial)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
string| cc_number_saved function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
wedlake.ca/ | Name: PHPSESSID Value: 6ok544rcdhovq4qjb8771b46v2 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
code.jquery.com
wedlake.ca
192.99.34.158
205.185.208.52
2606:4700::6810:5914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