bendigomobile-help.com
Open in
urlscan Pro
82.180.175.94
Malicious Activity!
Public Scan
Effective URL: https://bendigomobile-help.com/pages
Submission: On September 06 via manual from IN — Scanned from AU
Summary
TLS certificate: Issued by R3 on September 6th 2022. Valid for: 3 months.
This is the only time bendigomobile-help.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 11 | 82.180.175.94 82.180.175.94 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
1 | 103.211.241.30 103.211.241.30 | 45852 (BENDIGOBA...) (BENDIGOBANK-AS-AP Bendigo and Adelaide Bank Limited) | |
10 | 2 |
ASN45852 (BENDIGOBANK-AS-AP Bendigo and Adelaide Bank Limited, AU)
PTR: banking.bendigobank.com.au
banking.bendigobank.com.au |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
bendigomobile-help.com
2 redirects
bendigomobile-help.com |
75 KB |
1 |
bendigobank.com.au
banking.bendigobank.com.au |
69 KB |
10 | 2 |
Domain | Requested by | |
---|---|---|
11 | bendigomobile-help.com |
2 redirects
bendigomobile-help.com
|
1 | banking.bendigobank.com.au |
bendigomobile-help.com
|
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bendigobank.com.au |
demo.bendigobank.com.au |
Subject Issuer | Validity | Valid | |
---|---|---|---|
bendigomobile-help.com R3 |
2022-09-06 - 2022-12-05 |
3 months | crt.sh |
banking.bendigobank.com.au Entrust Certification Authority - L1M |
2022-04-26 - 2023-05-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://bendigomobile-help.com/pages
Frame ID: 7A74B616A6BF7A507CC1EDBC02F6A199
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Bendigo Bank - Logon to e-bankingPage URL History Show full URLs
-
http://bendigomobile-help.com/
HTTP 301
https://bendigomobile-help.com/ HTTP 302
https://bendigomobile-help.com/pages Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: See all Help Topics
Search URL Search Domain Scan URL
Title: Take a tour
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bendigomobile-help.com/
HTTP 301
https://bendigomobile-help.com/ HTTP 302
https://bendigomobile-help.com/pages Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pages
bendigomobile-help.com/ Redirect Chain
|
29 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
bendigomobile-help.com/front_end/front_end_files/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
bendigomobile-help.com/js/cntdjs/ |
87 KB 29 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
bendigomobile-help.com/js/cntdjs/ |
23 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cntd.js
bendigomobile-help.com/js/cntdjs/ |
3 KB 947 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.js
bendigomobile-help.com/js/shared/ |
2 KB 701 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online_status.js
bendigomobile-help.com/js/shared/ |
998 B 445 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
kb-banner.jpg
banking.bendigobank.com.au/static/assets/images/ |
69 KB 69 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
proximanova-regular__510298c5f4.woff2
bendigomobile-help.com/front_end/front_end_files/ |
12 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
proximanova-bold__aac7e61091.woff2
bendigomobile-help.com/front_end/front_end_files/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
September 6th 2022, 11:46:17 pm
UTC —
From Australia
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: confirmed active phishing targeting bendigo bank
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation string| urlroot string| uniqueid function| $ function| jQuery object| controller1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bendigomobile-help.com/ | Name: PHPSESSID Value: c85085247d884f0eff47562b8f8df062 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banking.bendigobank.com.au
bendigomobile-help.com
103.211.241.30
82.180.175.94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