![](/screenshots/cf505b39-c9a8-486b-8bd7-afd6050345aa.png)
ing.ingbetalingsverzoek.me
Open in
urlscan Pro
198.54.116.178
Malicious Activity!
Public Scan
Submission: On November 22 via automatic, source openphish
Summary
This is the only time ing.ingbetalingsverzoek.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 20 | 198.54.116.178 198.54.116.178 | 22612 (NAMECHEAP...) (NAMECHEAP-NET - Namecheap) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
4 | 23.8.3.21 23.8.3.21 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3 - Highwinds Network Group) | |
26 | 5 |
ASN22612 (NAMECHEAP-NET - Namecheap, Inc., US)
PTR: server232-5.web-hosting.com
ing.ingbetalingsverzoek.me |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
stackpath.bootstrapcdn.com |
ASN20940 (AKAMAI-ASN1, US)
PTR: a23-8-3-21.deploy.static.akamaitechnologies.com
www.ing.be |
ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US)
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
20 |
ingbetalingsverzoek.me
4 redirects
ing.ingbetalingsverzoek.me |
69 KB |
4 |
ing.be
www.ing.be |
|
1 |
jquery.com
code.jquery.com |
81 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
23 KB |
26 | 4 |
Domain | Requested by | |
---|---|---|
20 | ing.ingbetalingsverzoek.me |
4 redirects
ing.ingbetalingsverzoek.me
code.jquery.com |
4 | www.ing.be |
ing.ingbetalingsverzoek.me
|
1 | code.jquery.com |
ing.ingbetalingsverzoek.me
|
1 | stackpath.bootstrapcdn.com |
ing.ingbetalingsverzoek.me
|
26 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
about.ing.be |
www.ing.jobs |
www.facebook.com |
twitter.com |
www.linkedin.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
www.ing.be Entrust Certification Authority - L1M |
2018-08-21 - 2020-08-19 |
2 years | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://ing.ingbetalingsverzoek.me/nl/retail/login/
Frame ID: AEEC6DEF39F6DC4895994DA000CC0C65
Requests: 26 HTTP requests in this frame
Screenshot
![](/screenshots/cf505b39-c9a8-486b-8bd7-afd6050345aa.png)
Detected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Over ING
Search URL Search Domain Scan URL
Title: Jobs
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- http://ing.ingbetalingsverzoek.me/static/sso/6.3.8/ING_SSO/images/INGID.png HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/static/sso/6.3.8/ING_SSO/images/dropdown_arrow.png HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/static/sso/6.3.8/ING_SSO/images/CardID.png HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/public/iznzg/img/c-icon-sprite.png HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/static/ing-app-be-daily-banking-shell/5.10.0/bower_components/ing-uif-styles/assets/INGMe/Bold/INGMeWeb-Bold.woff2 HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/static/ing-app-be-daily-banking-shell/5.10.0/bower_components/ing-uif-styles/assets/INGMe/Regular/INGMeWeb-Regular.woff2 HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/static/ing-app-be-daily-banking-shell/5.10.0/bower_components/ing-uif-styles/assets/INGMe/Bold/INGMeWeb-Bold.woff HTTP 302
- https://www.ing.be/404
- http://ing.ingbetalingsverzoek.me/static/ing-app-be-daily-banking-shell/5.10.0/bower_components/ing-uif-styles/assets/INGMe/Regular/INGMeWeb-Regular.woff HTTP 302
- https://www.ing.be/404
26 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
![]() ing.ingbetalingsverzoek.me/nl/retail/login/ |
115 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.3.1/css/ |
152 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style1.css
ing.ingbetalingsverzoek.me/public/iznzg/css/ |
71 KB 12 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style2.css
ing.ingbetalingsverzoek.me/public/iznzg/css/ |
48 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ing-logo.svg
ing.ingbetalingsverzoek.me/public/iznzg/img/ |
11 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
CardReaderWithCard.png
ing.ingbetalingsverzoek.me/public/iznzg/img/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
256pxIdentify.png
ing.ingbetalingsverzoek.me/public/iznzg/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
256pxOK.png
ing.ingbetalingsverzoek.me/public/iznzg/img/ |
796 B 982 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 331 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 267 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
heartbeat
ing.ingbetalingsverzoek.me/ |
0 331 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery number| interval function| doAjax1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ing.ingbetalingsverzoek.me/ | Name: PHPSESSID Value: 81aad12e9bc6f87ea9436f27c583c811 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ing.ingbetalingsverzoek.me
stackpath.bootstrapcdn.com
www.ing.be
www.ing.be
198.54.116.178
2001:4de0:ac19::1:b:2b
2001:4de0:ac19::1:b:3b
23.8.3.21
2f391f22b692d0e6a48cfc0ccf9e1773402733d67b8157aa5885847a09a06f96
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
60b19e5da6a9234ff9220668a5ec1125c157a268513256188ee80f2d2c8d8d36
ab2cbe76234abd68c31962e5e025b6eb6b2913193467a8e63234a926b741558c
c62195c666197de0cff4f9a1630ee40c13e91269dbd3fc6248050dc0a3ad6818
c9254053b4ff5f85ca7a6973454fbf4c55ee6fbb1c3a31ded30eb2a48c6c9262
d86cf7f5bd28cd9c1f25fd2b5e0f6e0a5a1bdbf9253d0252e67072834f0d1e59
da4638536ea61163947d415fce63a19e4c7be592fe76908e9dac19eb35e5ea8f
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
fabca3bf79c51f07bf4a418d34df4fb885f243ee5a94422d083b3a1a7a20b5af