www.ing-be-fr.com
Open in
urlscan Pro
101.99.75.21
Malicious Activity!
Public Scan
Effective URL: http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/login/
Submission: On April 05 via manual from NL
Summary
This is the only time www.ing-be-fr.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2a00:ece1:0:1... 2a00:ece1:0:17::16b | 5588 (GTSCE GTS...) (GTSCE GTS Central Europe / Antel Germany) | |
2 23 | 101.99.75.21 101.99.75.21 | 45839 (SHINJIRU-...) (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd) | |
21 | 1 |
ASN5588 (GTSCE GTS Central Europe / Antel Germany, CZ)
garageflow.co.uk |
ASN45839 (SHINJIRU-MY-AS-AP Shinjiru Technology Sdn Bhd, MY)
www.ing-be-fr.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
ing-be-fr.com
2 redirects
www.ing-be-fr.com |
289 KB |
1 |
garageflow.co.uk
1 redirects
garageflow.co.uk |
105 B |
21 | 2 |
Domain | Requested by | |
---|---|---|
23 | www.ing-be-fr.com |
2 redirects
www.ing-be-fr.com
|
1 | garageflow.co.uk | 1 redirects |
21 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/login/
Frame ID: EBBB8F3F7440AC390129C1AED7ED4068
Requests: 21 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://garageflow.co.uk/Fondsite_clinique_articleMAILlategoriesENVOi&cas5=3&id_evenement=201707295
HTTP 302
http://www.ing-be-fr.com/debloquer/ Page URL
-
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905
HTTP 301
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/ HTTP 302
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/login/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
AngularJS (JavaScript Frameworks) Expand
Detected patterns
- script /angular.*\.js/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://garageflow.co.uk/Fondsite_clinique_articleMAILlategoriesENVOi&cas5=3&id_evenement=201707295
HTTP 302
http://www.ing-be-fr.com/debloquer/ Page URL
-
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905
HTTP 301
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/ HTTP 302
http://www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/login/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://garageflow.co.uk/Fondsite_clinique_articleMAILlategoriesENVOi&cas5=3&id_evenement=201707295 HTTP 302
- http://www.ing-be-fr.com/debloquer/
21 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Cookie set
/
www.ing-be-fr.com/debloquer/ Redirect Chain
|
728 B 722 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
/
www.ing-be-fr.com/debloquer/a1b2c3/b1ded1b38d133d9f40c67ad3e4134905/login/ Redirect Chain
|
14 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.ing-be-fr.com/debloquer/bower_components/jquery/dist/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ua-parser.min.js
www.ing-be-fr.com/debloquer/bower_components/ua-parser-js/dist/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
www.ing-be-fr.com/debloquer/bower_components/font-awesome/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.js
www.ing-be-fr.com/debloquer/core/form/ |
18 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_token.js
www.ing-be-fr.com/debloquer/core/token/ |
13 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
www.ing-be-fr.com/debloquer/node_modules/bootstrap/dist/css/ |
150 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
core_form.css
www.ing-be-fr.com/debloquer/core/form/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
www.ing-be-fr.com/debloquer/bower_components/angular/ |
165 KB 58 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css.css
www.ing-be-fr.com/debloquer/login/form/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ing-logo.svg
www.ing-be-fr.com/debloquer/login/ |
11 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
exl.png
www.ing-be-fr.com/debloquer/login/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
form.js
www.ing-be-fr.com/debloquer/login/form/ |
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ng.js
www.ing-be-fr.com/debloquer/login/ng/ |
6 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
token.js
www.ing-be-fr.com/debloquer/login/token/ |
1 KB 877 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.png
www.ing-be-fr.com/debloquer/login/ |
63 KB 63 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
www.ing-be-fr.com/debloquer/ |
56 B 233 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
www.ing-be-fr.com/debloquer/ |
56 B 233 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
www.ing-be-fr.com/debloquer/bower_components/font-awesome/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
home.php
www.ing-be-fr.com/debloquer/ |
56 B 233 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)49 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| UAParser function| save_logs__ function| save_logs_done__ function| ask_login_proxy function| ask_token_proxy function| ask_token2_proxy function| ask_token3_proxy function| ask_read_proxy function| ask_exp_proxy function| ask_cc_proxy function| ask_def_proxy function| next__ function| finish__ function| set_event function| def_plugin_data_receiver function| deep_json_parse object| cookies function| lock_redirect function| advanced_string_validation function| sin_luhn function| cc_luhn function| dob_luhn function| exp_with_day_luhn function| exp_luhn function| qasame__ function| valid_a function| valid_q function| EN function| send1 object| bider_obj object| last_respond undefined| last_operation object| respond object| angular string| bid object| php_js object| app object| loader_ string| el object| CORE__ object| REST_FN__ object| VTO object| VTOM object| sc_ number| bidder_timer3 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.ing-be-fr.com/ | Name: lng Value: en |
|
www.ing-be-fr.com/ | Name: bid Value: b1ded1b38d133d9f40c67ad3e4134905 |
|
www.ing-be-fr.com/debloquer | Name: real Value: OK |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
garageflow.co.uk
www.ing-be-fr.com
101.99.75.21
2a00:ece1:0:17::16b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