bendilgobnklgonpage.com
Open in
urlscan Pro
172.67.206.48
Malicious Activity!
Public Scan
Submission: On August 02 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by GTS CA 1P5 on August 2nd 2023. Valid for: 3 months.
This is the only time bendilgobnklgonpage.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 172.67.206.48 172.67.206.48 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 172.67.211.221 172.67.211.221 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bendilgobnklgonpage.com
bendilgobnklgonpage.com |
199 KB |
3 |
f34r2345nrerfasq.top
f34r2345nrerfasq.top |
458 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
7 | bendilgobnklgonpage.com |
bendilgobnklgonpage.com
|
3 | f34r2345nrerfasq.top |
bendilgobnklgonpage.com
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bendilgobnklgonpage.com GTS CA 1P5 |
2023-08-02 - 2023-10-31 |
3 months | crt.sh |
f34r2345nrerfasq.top E1 |
2023-06-28 - 2023-09-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bendilgobnklgonpage.com/acc/logonwebpage/
Frame ID: 3AD822A15EFFCA1D2707B3662E8AC394
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bendilgobnklgonpage.com/acc/logonwebpage/ |
38 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
bendilgobnklgonpage.com/assets/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
bendilgobnklgonpage.com/assets/js/ |
29 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
bendilgobnklgonpage.com/assets/js/ |
87 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
browser.js
bendilgobnklgonpage.com/assets/js/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
bendilgobnklgonpage.com/assets/js/ |
54 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switchnow.jpg
bendilgobnklgonpage.com/assets/img/ |
120 KB 120 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
detect
f34r2345nrerfasq.top/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
detect
f34r2345nrerfasq.top/api/ |
0 458 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST |
check-action
f34r2345nrerfasq.top/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
check-action
f34r2345nrerfasq.top/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- f34r2345nrerfasq.top
- URL
- https://f34r2345nrerfasq.top/api/check-action
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
August 2nd 2023, 11:11:46 pm
UTC —
From Australia
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: bing paid search Ad phishing url targeting bendigo bank
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| axios function| $ function| jQuery object| BrowserDetect function| _0x3011e1 function| _0xae6f10 function| _0x27cf function| _0x1255 function| rand0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bendilgobnklgonpage.com
f34r2345nrerfasq.top
f34r2345nrerfasq.top
172.67.206.48
172.67.211.221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