52-156-86-153.cprapid.com
Open in
urlscan Pro
52.156.86.153
Malicious Activity!
Public Scan
Effective URL: https://52-156-86-153.cprapid.com/.well-known/TELUSB/page.php?/TELUSProtection/URL==http%3A%2F%2Ftelus%40%24%25%2A%21%40.c%2FmfeWX...
Submission: On October 22 via manual from CA
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on October 19th 2020. Valid for: a year.
This is the only time 52-156-86-153.cprapid.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telus (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 52.156.86.153 52.156.86.153 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:81a::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 23.111.9.35 23.111.9.35 | 33438 (HIGHWINDS2) (HIGHWINDS2) | |
1 | 2606:4700:10:... 2606:4700:10::6816:4bab | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 67.202.94.93 67.202.94.93 | 32748 (STEADFAST) (STEADFAST) | |
12 | 7 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
cprapid.com
52-156-86-153.cprapid.com |
26 KB |
2 |
amung.us
widgets.amung.us whos.amung.us |
4 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
29 KB |
1 |
fontawesome.com
use.fontawesome.com |
278 KB |
1 |
googleapis.com
ajax.googleapis.com |
29 KB |
12 | 5 |
Domain | Requested by | |
---|---|---|
6 | 52-156-86-153.cprapid.com |
52-156-86-153.cprapid.com
|
2 | maxcdn.bootstrapcdn.com |
52-156-86-153.cprapid.com
|
1 | whos.amung.us |
widgets.amung.us
|
1 | widgets.amung.us |
52-156-86-153.cprapid.com
|
1 | use.fontawesome.com |
52-156-86-153.cprapid.com
|
1 | ajax.googleapis.com |
52-156-86-153.cprapid.com
|
12 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
52-156-86-153.cprapid.com cPanel, Inc. Certification Authority |
2020-10-19 - 2021-10-19 |
a year | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-09-22 - 2020-12-15 |
3 months | crt.sh |
*.fontawesome.com DigiCert SHA2 Secure Server CA |
2019-10-28 - 2020-12-23 |
a year | crt.sh |
whos.amung.us Sectigo RSA Domain Validation Secure Server CA |
2020-05-21 - 2022-05-21 |
2 years | crt.sh |
This page contains 2 frames:
Primary Page:
https://52-156-86-153.cprapid.com/.well-known/TELUSB/page.php?/TELUSProtection/URL==http%3A%2F%2Ftelus%40%24%25%2A%21%40.c%2FmfeWXuvychfEf&enrollID=mRtbFlGEqLSdwZJMwRutIXIZUuMMxtdqpPceZsOjiCGViPylcQypTPfAex
Frame ID: ACFA54FCEB73E5BB1F6383FB9CD95485
Requests: 9 HTTP requests in this frame
Frame:
https://52-156-86-153.cprapid.com/.well-known/TELUSB/framei.php
Frame ID: 3878BD92B88D25C892C1963722583280
Requests: 4 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://52-156-86-153.cprapid.com/.well-known/TELUSB/?sslID716006030203471 Page URL
- https://52-156-86-153.cprapid.com/.well-known/TELUSB/page.php?/TELUSProtection/URL==http%3A%2F%2Ftelus%40%24%2... Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<script[^>]* src=[^>]+fontawesome(?:\.js)?/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /\/([\d.]+)\/jquery(?:\.min)?\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://52-156-86-153.cprapid.com/.well-known/TELUSB/?sslID716006030203471 Page URL
- https://52-156-86-153.cprapid.com/.well-known/TELUSB/page.php?/TELUSProtection/URL==http%3A%2F%2Ftelus%40%24%25%2A%21%40.c%2FmfeWXuvychfEf&enrollID=mRtbFlGEqLSdwZJMwRutIXIZUuMMxtdqpPceZsOjiCGViPylcQypTPfAex Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
52-156-86-153.cprapid.com/.well-known/TELUSB/ |
275 B 657 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
page.php
52-156-86-153.cprapid.com/.well-known/TELUSB/ |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.3/ |
82 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/js/ |
36 KB 10 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
52-156-86-153.cprapid.com/.well-known/TELUSB/includes/js/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
all.js
use.fontawesome.com/releases/v5.0.6/js/ |
657 KB 278 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
52-156-86-153.cprapid.com/.well-known/TELUSB/includes/img/ |
4 KB 4 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading.gif
52-156-86-153.cprapid.com/.well-known/TELUSB/includes/img/ |
12 KB 13 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
framei.php
52-156-86-153.cprapid.com/.well-known/TELUSB/ Frame 3878 |
384 B 611 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
small.js
widgets.amung.us/ Frame 3878 |
8 KB 4 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ Frame 3878 |
29 B 145 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame 3878 |
439 B 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telus (Telecommunication)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery object| ___FONT_AWESOME___ object| FontAwesomeConfig object| FontAwesome1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
52-156-86-153.cprapid.com/ | Name: PHPSESSID Value: add604f158f29e7be4cffc0fd2c5a34f |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
52-156-86-153.cprapid.com
ajax.googleapis.com
maxcdn.bootstrapcdn.com
use.fontawesome.com
whos.amung.us
widgets.amung.us
2001:4de0:ac19::1:b:3b
23.111.9.35
2606:4700:10::6816:4bab
2a00:1450:4001:81a::200a
52.156.86.153
67.202.94.93
0298a25db873588e37945ece2b90e9f573dda86bfc84ae9f3efb8c3fbdcbce84
1b31afdfd23628d9fb1118e31841278653c4ef36a6d0970c002d43e49b5d1856
42a8cc7afb7adf2b1dcbf1fa4e463bb409359931d5b931f6e133637b69939c6b
53964478a7c634e8dad34ecc303dd8048d00dce4993906de1bacf67f663486ef
7cad81787801f7755885579d270c5828ce4e3afde3d5886abdf9faa0eb6ee6de
8191e57a7677ccf16deb6ebc3647f80affccdf1cc8ebc5f8e5e432d6007f1792
8af93bd675e1cfd9ecc850e862819fdac6e3ad1f5d761f970e409c7d9c63bdc3
8c0b230f7dcf65e2f232a2825bc769fb4dcff96982af865b1f6e72a86f196d2b
aa1e4e3c6deca0d0d23e10524b6abbda4245ee6bae5c1e2f722161c26e4793ed
b616982d6b456593a93dda3859616f56190b2c6ae8bd302fb9b122d28c7be4c4
bfb168ddfc0b73947c5301535b9772770e9fe321b8496916c5e8843cf83528e4
f6d82f567d08ec91a1b6ef0d4abf21be7a2d3dbc0a41c122584ea3536755b3ac
f75e846cc83bd11432f4b1e21a45f31bc85283d11d372f7b19accd1bf6a2635c