webmail-onehealth-ca-groupoffice-9o6ir1yhw8.edgeone.cool
Category: Phishing And Fraud
To use full-featured product, you have to purchase a license for Combo Cleaner. Limited seven days free trial available. Combo Cleaner is owned and operated by RCS LT, the parent company of PCRisk.com.
Description of webmail-onehealth-ca-groupoffice-9o6ir1yhw8.edgeone.cool
This domain appears to host a web-based email login page presented as a secure document or email portal. The page title, "Email Portal Access | Secure Digital Platform," and the screenshot indicate a credential-entry form asking for an email address and password, with branding references to common mail providers such as Microsoft, Outlook, webmail, and G Suite. The subdomain string includes terms like "webmail" and "onehealth-ca-groupoffice," which suggests it may be attempting to target users associated with an organization or business email environment.
Based on the visible content, this does not appear to be a full corporate website with normal navigation, company information, or service documentation. Instead, it appears to be a single-purpose login interface focused on collecting email credentials. The domain is hosted under an edge-hosting platform subdomain rather than an obvious primary organizational domain, which may be inconsistent with how established institutions typically publish employee or customer email portals.
Safety Assessment for webmail-onehealth-ca-groupoffice-9o6ir1yhw8.edgeone.cool
Multiple security signals indicate elevated risk at the time of this scan. The URL was flagged by 16 out of 91 security engines, and multiple web-classification providers categorized it as phishing or fraud-related. In addition, the screenshot shows a standalone email credential form with generic wording such as "Document Encryption" and "Sign in with your organization's email credentials," which is a common pattern seen on credential-harvesting pages.
Some technical checks were clean, including the page malware scan, which did not identify flagged files, and several blacklist databases did not list the domain at the time of this scan. However, those clean results do not outweigh the stronger phishing-related indicators here, especially given the domain structure, the lack of an established brand-owned domain, the very focused login form, and the multi-engine phishing detections.
Based on these findings, this website may pose potential risks to visitors, particularly anyone asked to enter email account credentials.
Technical Description
The site was reachable over HTTPS with a valid TLS certificate issued by a mainstream certificate authority, expiring in November 2026. It appears to be served by an edge-hosting environment identified as "edgeone-pages," with hosting infrastructure located in Singapore. The domain uses nameservers from its registrar ecosystem and has DNSSEC listed as unsigned.
From an infrastructure perspective, the presence of HTTPS alone should not be treated as a trust signal, since phishing pages commonly use valid certificates as well. The domain is relatively new at 347 days old, is not ranked among widely visited sites, and uses a long subdomain on a shared hosting platform, all of which may be consistent with disposable or campaign-style phishing deployment.
Share your experience with this website. Was it safe? Did you encounter any issues?