www.freecaseprep.com
Open in
urlscan Pro
162.214.213.126
Malicious Activity!
Public Scan
Submission: On June 17 via automatic, source openphish
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on May 25th 2021. Valid for: 3 months.
This is the only time www.freecaseprep.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Tangerine Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
29 | 162.214.213.126 162.214.213.126 | 46606 (UNIFIEDLA...) (UNIFIEDLAYER-AS-1) | |
31 | 2 |
ASN46606 (UNIFIEDLAYER-AS-1, US)
PTR: vps-6540634.exododigitalmkt.com.br
www.freecaseprep.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
29 |
freecaseprep.com
www.freecaseprep.com |
1 MB |
0 |
tangerine.ca
Failed
www.tangerine.ca Failed |
|
31 | 2 |
Domain | Requested by | |
---|---|---|
29 | www.freecaseprep.com |
www.freecaseprep.com
|
0 | www.tangerine.ca Failed |
www.freecaseprep.com
|
31 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.tangerine.ca |
Subject Issuer | Validity | Valid | |
---|---|---|---|
freecaseprep.com cPanel, Inc. Certification Authority |
2021-05-25 - 2021-08-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.freecaseprep.com/CPUD/banks/directing/tangerine/index.php
Frame ID: 2DB06D46B6B54508E1EC47083FD976EF
Requests: 31 HTTP requests in this frame
Screenshot
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- url /\.php(?:$|\?)/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Dynatrace (Analytics) Expand
Detected patterns
- script /dtagent.*\.js/i
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: Canada Deposit Insurance Corporation
Search URL Search Domain Scan URL
Title: Security Guarantee
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
31 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index.php
www.freecaseprep.com/CPUD/banks/directing/tangerine/ |
31 KB 31 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
cool-2.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
14 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ec.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
567781970021690.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fbevents.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
39 KB 39 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uwt.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
analytics.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
35 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gtm.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
287 KB 287 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
dtagent_ICA23TVgjpqrtx_7000000031020.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
91 KB 91 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
global.css
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
103 KB 104 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
809 KB 809 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo_002.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
96 B 350 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
281 B 536 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brand-white.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brand-orange.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
702 B 943 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
869 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
532 B 773 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
398 B 639 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
brand.png
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pm_fp.js
www.freecaseprep.com/CPUD/banks/directing/tangerine/files/ |
24 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-regular-webfont.woff2
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-bold-webfont.woff2
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lineto-tangerinecircular-boldtitling.woff
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-regular-webfont.woff
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-bold-webfont.woff
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lineto-tangerinecircular-boldtitling.ttf
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-regular-webfont.ttf
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
proximanova-bold-webfont.ttf
www.freecaseprep.com/CPUD/banks/assets/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST |
dynaTraceMonitor
www.tangerine.ca/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
POST |
dynaTraceMonitor
www.tangerine.ca/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.tangerine.ca
- URL
- https://www.tangerine.ca/dynaTraceMonitor?type=js&flavor=cors&referer=https%3A%2F%2Fwww.freecaseprep.com%2FCPUD%2Fbanks%2Fdirecting%2Ftangerine%2Findex.php&app=www.tangerine.ca
- Domain
- www.tangerine.ca
- URL
- https://www.tangerine.ca/dynaTraceMonitor?type=js&flavor=cors&referer=https%3A%2F%2Fwww.freecaseprep.com%2FCPUD%2Fbanks%2Fdirecting%2Ftangerine%2Findex.php&app=www.tangerine.ca
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Tangerine Bank (Banking)34 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| gaplugins function| ga object| a object| dT_ object| dynaTrace object| IGLOO function| activeXDetect function| stripIllegalChars function| stripFullPath function| FingerPrint function| Hashtable function| IE_FingerPrint function| Mozilla_FingerPrint function| Opera_FingerPrint function| add_deviceprint function| urlEncode function| encode_deviceprint function| decode_deviceprint function| post_deviceprint object| twttr object| google_tag_manager function| postscribe object| dataLayer1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.freecaseprep.com/ | Name: dtPC Value: 337694131_732h1 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.freecaseprep.com
www.tangerine.ca
www.tangerine.ca
162.214.213.126
058ed961bfe422af7bfc65865f4c08531ec8ace995f8a1ec560a46581cb7712c
05eaedc75ba2fb416ac37d1566cc8f22542c8fe32b6fb16706e8a10c74a5906b
089f9be970df498a4d6a96eeaad2e50a5a749cd5f1ad830eae1b9a11a590cbec
11730a27d4a3e6406729363973fc6607042a61cd9fa002cebd34987ff702749f
1c0ce71531aecd109eecce9966180782910028a34b62c6ccf850bb24dad70df7
23ef5e1f819afa52fc3c8a12ff076054d2934ec69ac6315f8858cad0ddbff580
29451fb716c05b025bfb8a468767f7112baad0112dbc512d1610f64dbbad4bc0
319949c8c08b86e9c35ea542c0dc0c30cedaa9b8d3d3c3327a36c91aefbd8af5
31fe8b1d967dadc64c2832724685c5f965ae7720481672cc7635506e7175fbea
376dc44a4bcae47d222019f4f1f0434f6af04ca6d5ca6e38f8c28c2365483a23
3e72de5de67d6d80b65a114af684eaf880c53c250155a663cb17d677ff064bc1
6e0b372fd0732081733eeb983c0693bbb6e623c126697ab16a9698845fd47bfa
7768bbc373cb313d7b7e643d1541ff653f436e83910f594ea9e8f018b8422e93
7eb7cde1623a311ee9a0414ecede0980b00a282c9cfed274ea4b948003c5e99a
a900806f01bb127b471228bf4598a6c907fd1b26eae4f2c7c95cefd3adb5f9ec
b0c0092ef63e49ce2ca0c56290809c62cbd0f6c6fbf8fc5824fc183f5b49a3b8
da84e9b416adb61fca22009fa86d7273f94799a1b436df907483ce2d4b32a645
e28333e37a1be0388e316cf72960adbc610db5510b21223ffbd1788ad5bbc736
e4a8bb18ceed53c64f287922ca7cda8dad0bc57a98f3b3780f51cb0fb5e02545
f8ef655ef916e39713ede9c6db56d7ca5618bd82cf5ac991dcd013f05e0fdfc7