thelearningplaybook.com
Open in
urlscan Pro
74.220.211.107
Malicious Activity!
Public Scan
Submission: On July 07 via api from US
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on June 22nd 2020. Valid for: 3 months.
This is the only time thelearningplaybook.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Fidelity (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 74.220.211.107 74.220.211.107 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
15 | 1 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: 74-220-211-107.unifiedlayer.com
thelearningplaybook.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
thelearningplaybook.com
thelearningplaybook.com |
89 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | thelearningplaybook.com |
thelearningplaybook.com
|
15 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
cpanel.thelearningplaybook.com Let's Encrypt Authority X3 |
2020-06-22 - 2020-09-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://thelearningplaybook.com/investmentportal-fidelity./aboutus.php
Frame ID: 8E3F7A3CF34C07661666430CEA96CB1A
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Nginx (Web Servers) Expand
Detected patterns
- headers server /nginx(?:\/([\d.]+))?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
aboutus.php
thelearningplaybook.com/investmentportal-fidelity./ |
3 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
thelearningplaybook.com/investmentportal-fidelity./css/ |
9 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jqueryLib.js
thelearningplaybook.com/investmentportal-fidelity./js/ |
85 KB 37 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
actions.js
thelearningplaybook.com/investmentportal-fidelity./js/ |
3 KB 895 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img16.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img17.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img18.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
3 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img34.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img35.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img27.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
btncontinue.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img29.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img33.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img36.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
img32.png
thelearningplaybook.com/investmentportal-fidelity./images/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Fidelity (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| input0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
thelearningplaybook.com
74.220.211.107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