telus-refundrequest.com
Open in
urlscan Pro
93.158.239.22
Malicious Activity!
Public Scan
Effective URL: https://telus-refundrequest.com/redeem2535/telus
Submission: On April 03 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by R3 on April 3rd 2021. Valid for: 3 months.
This is the only time telus-refundrequest.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telus (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 93.158.239.22 93.158.239.22 | 60503 (FNXTEC) (FNXTEC) | |
2 | 2600:9000:218... 2600:9000:2182:b200:12:94b3:c380:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
4 | 99.86.3.121 99.86.3.121 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 3 |
ASN60503 (FNXTEC, BR)
PTR: protected.hyperfilter.com
telus-refundrequest.com |
ASN16509 (AMAZON-02, US)
images.ctfassets.net |
ASN16509 (AMAZON-02, US)
PTR: server-99-86-3-121.fra6.r.cloudfront.net
cdn.telus.digital |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
telus.digital
cdn.telus.digital |
94 KB |
2 |
ctfassets.net
images.ctfassets.net |
3 KB |
2 |
telus-refundrequest.com
1 redirects
telus-refundrequest.com |
23 KB |
7 | 3 |
Domain | Requested by | |
---|---|---|
4 | cdn.telus.digital |
telus-refundrequest.com
|
2 | images.ctfassets.net |
telus-refundrequest.com
|
2 | telus-refundrequest.com | 1 redirects |
7 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.telus.com |
forum.telus.com |
stores.telus.com |
crtc.gc.ca |
www.telusinternational.com |
webmail.telus.net |
Subject Issuer | Validity | Valid | |
---|---|---|---|
telus-refundrequest.com R3 |
2021-04-03 - 2021-07-02 |
3 months | crt.sh |
images.ctfassets.net Amazon |
2021-03-19 - 2022-04-17 |
a year | crt.sh |
cdn.telus.digital DigiCert Global CA G2 |
2020-06-23 - 2021-07-09 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://telus-refundrequest.com/redeem2535/telus
Frame ID: 1005D711CE820BCA30C3DB8B9AA609D5
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://telus-refundrequest.com/
HTTP 302
https://telus-refundrequest.com/redeem2535/telus Page URL
Detected technologies
Nginx (Web Servers) ExpandDetected patterns
- headers server /nginx(?:\/([\d.]+))?/i
Page Statistics
25 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: COVID-19:Learn how we’re supporting communities and helping Canadians stay connected.
Search URL Search Domain Scan URL
Title: Log in
Search URL Search Domain Scan URL
Title: About Us
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Title: Media
Search URL Search Domain Scan URL
Title: Policies
Search URL Search Domain Scan URL
Title: TELUS Service Status
Search URL Search Domain Scan URL
Title: Support
Search URL Search Domain Scan URL
Title: Contact Us
Search URL Search Domain Scan URL
Title: Neighbourhood
Search URL Search Domain Scan URL
Title: Find A Store
Search URL Search Domain Scan URL
Title: User Terms
Search URL Search Domain Scan URL
Title: Service Terms
Search URL Search Domain Scan URL
Title: TELUS & CRTC Internet Code
Search URL Search Domain Scan URL
Title: Internet Code, Simplified
Search URL Search Domain Scan URL
Title: TELUS & CRTC Wireless Code
Search URL Search Domain Scan URL
Title: Wireless Code, Simplified
Search URL Search Domain Scan URL
Title: Privacy / Cookies
Search URL Search Domain Scan URL
Title: Security
Search URL Search Domain Scan URL
Title: TELUS Digital
Search URL Search Domain Scan URL
Title: TELUS International
Search URL Search Domain Scan URL
Title: TELUS Procurement
Search URL Search Domain Scan URL
Title: TELUS Webmail
Search URL Search Domain Scan URL
Title: TELUS Wise
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://telus-refundrequest.com/
HTTP 302
https://telus-refundrequest.com/redeem2535/telus Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
telus
telus-refundrequest.com/redeem2535/ Redirect Chain
|
182 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Logo_TELUS.svg
images.ctfassets.net/fikanzmkdlqn/3yUnySNpS8IS4CeyUeWgeg/5bcfa9c592acfe591f26d85f6820fa5f/ |
2 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Logo_TELUS_white.svg
images.ctfassets.net/fikanzmkdlqn/1LW10x1QLC2esi6YgAAKia/56e4e0773a6922432919cec5dbe7a87e/ |
2 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core-icons.woff2
cdn.telus.digital/thorium/core/v0.4.0/ |
4 KB 5 KB |
Font
binary/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3e8a8b56-3cb0-4347-b670-eaaf06b76e9b.woff2
cdn.telus.digital/thorium/core/fonts/etext/ |
19 KB 19 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
aff68211-86bb-476d-882e-f7a3face144c.woff2
cdn.telus.digital/thorium/core/fonts/ |
49 KB 50 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
b8765d4b-d9a3-48b9-ac65-560e7517cf0e.woff2
cdn.telus.digital/thorium/core/fonts/etext/ |
19 KB 20 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telus (Telecommunication)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
telus-refundrequest.com/ | Name: PHPSESSID Value: nc31cs3f2vb5btj7h8gaa1kn5i |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.telus.digital
images.ctfassets.net
telus-refundrequest.com
2600:9000:2182:b200:12:94b3:c380:93a1
93.158.239.22
99.86.3.121
31bf43ce5c4741bfd9fda40462c63bfb1e518f0e4ca88a09ff7f963cd3b3f67b
56b0625243f403285df4a6ec2b3bb68b17501a6a95ba30252a917c06d4395f58
726b4339c7bca67dbba88d1f121857e2130d7ac194df7a512461ae621cfc2ff1
cbe1b0f1185a0b862a1e9ed248098ff59f79de8c00cd0ea2dd873023e704d3f4
d8985cae9eda7ce2bb937053b26c94a391b53c4e2563ed77c6527db0e41a16e4
f359506f6b180c71a66df1e1e1de710199af83800e0f89e9efa6459946c30c5e
f776d0dfb485629c7351534355429068fd43071b7613e3d2042986fd5b5bf46c