bendiaccoumtpg.com
Open in
urlscan Pro
52.38.173.188
Malicious Activity!
Public Scan
Submission: On June 06 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on June 3rd 2023. Valid for: 3 months.
This is the only time bendiaccoumtpg.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 52.38.173.188 52.38.173.188 | 16509 (AMAZON-02) (AMAZON-02) | |
3 | 172.67.217.145 172.67.217.145 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 3 |
ASN16509 (AMAZON-02, US)
PTR: ec2-52-38-173-188.us-west-2.compute.amazonaws.com
bendiaccoumtpg.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bendiaccoumtpg.com
bendiaccoumtpg.com |
178 KB |
3 |
k54687913.group
k54687913.group |
444 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
7 | bendiaccoumtpg.com |
bendiaccoumtpg.com
|
3 | k54687913.group |
bendiaccoumtpg.com
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bendiaccoumtpg.com R3 |
2023-06-03 - 2023-09-01 |
3 months | crt.sh |
k54687913.group GTS CA 1P5 |
2023-04-24 - 2023-07-23 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bendiaccoumtpg.com/logln/web/
Frame ID: F9CEE9622E7B0FAFDC88745533CC487B
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bendiaccoumtpg.com/logln/web/ |
38 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
bendiaccoumtpg.com/assets/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
bendiaccoumtpg.com/assets/js/ |
29 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
bendiaccoumtpg.com/assets/js/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
browser.js
bendiaccoumtpg.com/assets/js/ |
2 KB 929 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
bendiaccoumtpg.com/assets/js/ |
8 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switchnow.jpg
bendiaccoumtpg.com/assets/img/ |
120 KB 120 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
detect
k54687913.group/api/ |
0 444 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
detect
k54687913.group/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST |
check-action
k54687913.group/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
check-action
k54687913.group/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- k54687913.group
- URL
- https://k54687913.group/api/check-action
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend function| axios function| $ function| jQuery object| BrowserDetect function| rand0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bendiaccoumtpg.com
k54687913.group
k54687913.group
172.67.217.145
52.38.173.188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