ftp.edutap.co.in
Open in
urlscan Pro
139.59.65.234
Malicious Activity!
Public Scan
Effective URL: https://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/
Submission: On October 27 via api from QA
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on September 4th 2020. Valid for: 3 months.
This is the only time ftp.edutap.co.in was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 18 | 139.59.65.234 139.59.65.234 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
16 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
18 |
edutap.co.in
2 redirects
ftp.edutap.co.in |
87 KB |
16 | 1 |
Domain | Requested by | |
---|---|---|
18 | ftp.edutap.co.in |
2 redirects
ftp.edutap.co.in
|
16 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
inlogcodes.mijn.ing.nl |
aanvragen.ing.nl |
www.ing.nl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
edutap.co.in Let's Encrypt Authority X3 |
2020-09-04 - 2020-12-03 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/
Frame ID: 0682841A4EFB126694419EAEA87492B3
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66
HTTP 301
https://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66 HTTP 301
https://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/ Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: Gebruikersnaam of wachtwoord vergeten?
Search URL Search Domain Scan URL
Title: Mijn ING aanvragen
Search URL Search Domain Scan URL
Title: Contact met ING
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66
HTTP 301
https://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66 HTTP 301
https://ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/ Redirect Chain
|
10 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jsq.js.t%C3%A9l%C3%A9chargement
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
111 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ing-logo.svg
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
11 KB 12 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alert-error.svg
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
623 B 911 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkbox.svg
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
281 B 569 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-chevron-open-right.svg
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
366 B 655 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
menu-close.svg
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
348 B 637 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
illustratie_algemenestoring.png
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
14 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base.css
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
811383197.svg
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/img/ |
16 KB 16 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1224525800.woff2
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_388920554.woff2
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_653235830.woff
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2065664156.woff
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
_1268000844.ttf
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1867746914.ttf
ftp.edutap.co.in/mijn.ing.com/20ce01d75be699b6e5d716387ed50a66/img/css/fonts/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ftp.edutap.co.in
139.59.65.234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