![](/screenshots/dd564d2f-4401-409e-8f6a-925eca7e3633.png)
nereus.s3.amazonaws.com
Open in
urlscan Pro
52.219.152.145
Malicious Activity!
Public Scan
Submission: On January 15 via manual from AU — Scanned from JP
Summary
TLS certificate: Issued by Amazon on September 21st 2022. Valid for: a year.
This is the only time nereus.s3.amazonaws.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.219.152.145 52.219.152.145 | 16509 (AMAZON-02) (AMAZON-02) | |
8 | 2a04:4e42:200... 2a04:4e42:200::485 | 54113 (FASTLY) (FASTLY) | |
1 | 2404:6800:400... 2404:6800:4004:81e::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 162.159.130.233 162.159.130.233 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 5 |
ASN16509 (AMAZON-02, US)
PTR: s3-ap-northeast-1-w.amazonaws.com
nereus.s3.amazonaws.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 357 |
151 KB |
2 |
discordapp.com
cdn.discordapp.com — Cisco Umbrella Rank: 3568 |
12 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 199 |
6 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 292 |
31 KB |
1 |
amazonaws.com
nereus.s3.amazonaws.com |
15 KB |
13 | 5 |
Domain | Requested by | |
---|---|---|
8 | cdn.jsdelivr.net |
nereus.s3.amazonaws.com
|
2 | cdn.discordapp.com |
nereus.s3.amazonaws.com
|
1 | cdnjs.cloudflare.com |
nereus.s3.amazonaws.com
|
1 | ajax.googleapis.com |
nereus.s3.amazonaws.com
|
1 | nereus.s3.amazonaws.com | |
13 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
banking.bendigobank.com.au |
www.bendigobank.com.au |
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.s3.amazonaws.com Amazon |
2022-09-21 - 2023-08-26 |
a year | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2022 Q4 |
2022-12-23 - 2024-01-24 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-12-12 - 2023-03-06 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://nereus.s3.amazonaws.com/coupon/index1.html
Frame ID: 2A7CE2563F67E6FA018D970F31764505
Requests: 13 HTTP requests in this frame
Screenshot
![](/screenshots/dd564d2f-4401-409e-8f6a-925eca7e3633.png)
Page Title
Bendigo Bank - Log in to e-bankingDetected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Read more
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
index1.html
nereus.s3.amazonaws.com/coupon/ |
15 KB 15 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@4.6.2/dist/css/ |
158 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.slim.min.js
cdn.jsdelivr.net/npm/jquery@3.6.1/dist/ |
71 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/popper.js@1.16.1/dist/umd/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@4.6.2/dist/js/ |
81 KB 22 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.1/ |
88 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.5.0/css/ |
32 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.2.3/dist/css/ |
190 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.bundle.min.js
cdn.jsdelivr.net/npm/bootstrap@5.3.0-alpha1/dist/js/ |
79 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdn.jsdelivr.net/npm/@popperjs/core@2.11.6/dist/umd/ |
20 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
cdn.jsdelivr.net/npm/bootstrap@5.3.0-alpha1/dist/js/ |
59 KB 16 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bendigologo.JPG
cdn.discordapp.com/attachments/1063572301276250132/1063586705879343134/ |
7 KB 7 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
user.JPG
cdn.discordapp.com/attachments/1063572301276250132/1063586829149945887/ |
4 KB 5 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
January 15th 2023, 11:18:43 pm
UTC —
From India
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: confirmed phishing url targeting bendigo bank
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontentvisibilityautostatechange function| $ function| jQuery object| Popper object| bootstrap number| uidEvent1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.discordapp.com/ | Name: __cf_bm Value: tefMowAoKnimovMp2ygjPNnKKq36IziZ2uAJgMHOZT4-1673824671-0-AZh2EdN2OaLrT+V9zu7/wxRFUQDa09hj2Av00nA3/SJBUwuwZWjWWb/7nJsu/DnUKrJ2oVp1n7x1rZReDej3bwk= |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
cdn.discordapp.com
cdn.jsdelivr.net
cdnjs.cloudflare.com
nereus.s3.amazonaws.com
162.159.130.233
2404:6800:4004:81e::200a
2606:4700::6811:190e
2a04:4e42:200::485
52.219.152.145
051a8137b75880006ab58f47778ca713ed6c967130faba043c5cd0ed34517dc8
061f0b1ea79e6e2ca24f4603e55d3e909f7471ba0b279cdb6dea40554106c6a2
082b0736a3408950e50fd65a090921003fe83d89ec6e3084549a01d5dfa9e854
19126b874a32753d42c12dfa6c17892bfd93820a5a5100ba1b34da4d07599b49
34f2409f58b3fd380f8efcde331e18531e6c4bce3ac22ffaa01ef2a8ed2efd4b
68c46ca940686aaea0e08afc862b09153b8561569d928014294bc1ad3c0736ce
85a21c5d2559ff67d914d25cfe880bc059371b0c339428853bdb3fffd687e9b3
8f04400ab995af959c7887aee00c8e35c3d5a0614e685242ad9bdeb84a949977
a3cf00c109d907e543bc4f6dbc85eb31068f94515251347e9e57509b52ee3d74
c0bcf7898fdc3b87babca678cd19a8e3ef570e931c80a3afbffcc453738c951a
c3c0af845b3b88735552d9d23f460a120d34a7d221d77ae52fdcc6aaf2dd78f0
f886516f3d41e9e7bd994c7f7a39a89cafae9483f90396cb0ddeafe8d1ea5e72
fe28dc38bc057f6eb11180235bbe458b3295a39b674d889075d3d9a0b5071d9f