142.11.212.213
Open in
urlscan Pro
142.11.212.213
Malicious Activity!
Public Scan
Summary
This is the only time 142.11.212.213 was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Canadian Government (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 142.11.212.213 142.11.212.213 | 54290 (HOSTWINDS) (HOSTWINDS) | |
15 | 1 |
ASN54290 (HOSTWINDS, US)
PTR: hwsrv-748382.hostwindsdns.com
142.11.212.213 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 | 0 |
Domain | Requested by | |
---|---|---|
15 | 0 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cra-arc.gc.ca |
Subject Issuer | Validity | Valid |
---|
This page contains 3 frames:
Primary Page:
http://142.11.212.213/
Frame ID: 53D7AE83D3A91EBCF2052E98C55044D4
Requests: 13 HTTP requests in this frame
Frame:
http://142.11.212.213/cra_files/wmms-alt.svg
Frame ID: 3AC21B0F81157E1B7BFFCD8A143A0851
Requests: 1 HTTP requests in this frame
Frame:
http://142.11.212.213/cra_files/sig-alt-en.svg
Frame ID: 24B4A13265E865240EC2548C237FD56B
Requests: 1 HTTP requests in this frame
2 Outgoing links
These are links going to different origins than the main page.
Title: Terms and conditions of use
Search URL Search Domain Scan URL
Title: Conditions régissant l'utilisation
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
142.11.212.213/ |
9 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wet-boew.css
142.11.212.213/cra_files/ |
240 B 530 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
theme-sp-pe.css
142.11.212.213/cra_files/ |
188 KB 32 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datepicker.js
142.11.212.213/cra_files/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
datepicker.css
142.11.212.213/cra_files/ |
666 B 695 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
en.js
142.11.212.213/cra_files/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
142.11.212.213/cra_files/ |
82 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wet-boew.js
142.11.212.213/cra_files/ |
129 KB 45 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
load_video.js
142.11.212.213/cra_files/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sp-pe-bg.jpg
142.11.212.213/assets/ |
276 B 276 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sp-pe-leaf.jpg
142.11.212.213/assets/ |
276 B 276 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
wmms-alt.svg
142.11.212.213/cra_files/ Frame 3AC2 |
5 KB 5 KB |
Document
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sig-alt-en.svg
142.11.212.213/cra_files/ Frame 24B4 |
10 KB 11 KB |
Document
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
en.js
142.11.212.213/cra_files/i18n/ |
276 B 276 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
en.js
142.11.212.213/cra_files/i18n/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Canadian Government (Government)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| Modernizr function| yepnope object| wb function| onYouTubeIframeAPIReady object| youTube function| getInfo0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
142.11.212.213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