wilt.hier-beste.xyz
Open in
urlscan Pro
198.54.126.121
Malicious Activity!
Public Scan
Effective URL: https://wilt.hier-beste.xyz/portal/login
Submission Tags: phishing spamreports malicious Search All
Submission: On November 15 via api from BG
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on November 6th 2020. Valid for: a year.
This is the only time wilt.hier-beste.xyz was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 25 | 198.54.126.121 198.54.126.121 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
20 | 1 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server54-5.web-hosting.com
wilt.hier-beste.xyz |
Apex Domain Subdomains |
Transfer | |
---|---|---|
25 |
hier-beste.xyz
5 redirects
wilt.hier-beste.xyz |
142 KB |
20 | 1 |
Domain | Requested by | |
---|---|---|
25 | wilt.hier-beste.xyz |
5 redirects
wilt.hier-beste.xyz
|
20 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
inlogcodes.mijn.ing.nl |
aanvragen.ing.nl |
www.ing.nl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
wilt.hier-beste.xyz Sectigo RSA Domain Validation Secure Server CA |
2020-11-06 - 2021-11-06 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://wilt.hier-beste.xyz/portal/login
Frame ID: 6ED563655030983B5B3A880A03C904AD
Requests: 20 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://wilt.hier-beste.xyz/
HTTP 301
https://wilt.hier-beste.xyz/ HTTP 302
https://wilt.hier-beste.xyz/portal/login Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Wachtwoord en/of gebruikersnaam vergeten?
Search URL Search Domain Scan URL
Title: Mijn ING Particulier aanvragen
Search URL Search Domain Scan URL
Title: Mijn ING Zakelijk aanvragen
Search URL Search Domain Scan URL
Title: Contact met ING Particulier
Search URL Search Domain Scan URL
Title: Contact met ING Zakelijk
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://wilt.hier-beste.xyz/
HTTP 301
https://wilt.hier-beste.xyz/ HTTP 302
https://wilt.hier-beste.xyz/portal/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://wilt.hier-beste.xyz/login/assets/images/icons/menu-close.svg HTTP 302
- https://wilt.hier-beste.xyz/portal/login
- https://wilt.hier-beste.xyz/login/assets/images/illustratie_algemenestoring.png HTTP 302
- https://wilt.hier-beste.xyz/portal/login
- https://wilt.hier-beste.xyz/login/assets/images/icons/arrow-chevron-open-right.svg HTTP 302
- https://wilt.hier-beste.xyz/portal/login
20 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
wilt.hier-beste.xyz/portal/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ing-logo.svg
wilt.hier-beste.xyz/public/iznzg/images/svg/ |
11 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login
wilt.hier-beste.xyz/portal/ Redirect Chain
|
10 KB 10 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-chevron-open-right.svg
wilt.hier-beste.xyz/public/iznzg/images/ |
366 B 414 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login
wilt.hier-beste.xyz/portal/ Redirect Chain
|
10 KB 10 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login
wilt.hier-beste.xyz/portal/ Redirect Chain
|
10 KB 10 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
wilt.hier-beste.xyz/public/iznzg/css/ |
17 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
wilt.hier-beste.xyz/public/iznzg/js/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
811383197.svg
wilt.hier-beste.xyz/public/iznzg/css/css-resources/ |
21 KB 9 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1224525800.woff2
wilt.hier-beste.xyz/public/iznzg/css/css-resources/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
_388920554.woff2
wilt.hier-beste.xyz/public/iznzg/css/css-resources/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
wilt.hier-beste.xyz/ |
0 188 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery number| interval function| doAjax1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
wilt.hier-beste.xyz/ | Name: PHPSESSID Value: 7b21bdfa8a0ea73315fc246907768975 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
wilt.hier-beste.xyz
198.54.126.121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