ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website
Open in
urlscan Pro
162.213.251.110
Malicious Activity!
Public Scan
Submission: On June 04 via manual from NL
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on June 4th 2020. Valid for: a year.
This is the only time ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 162.213.251.110 162.213.251.110 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 209.197.3.24 209.197.3.24 | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2606:4700::68... 2606:4700::6810:84e5 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 4 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server273-5.web-hosting.com
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website |
ASN20446 (HIGHWINDS3, US)
PTR: vip0x018.map2.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
nieuwtoegangklanten-nl.website
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website |
103 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
32 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com |
7 KB |
1 |
jquery.com
code.jquery.com |
24 KB |
13 | 4 |
Domain | Requested by | |
---|---|---|
9 | ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website |
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website
|
2 | maxcdn.bootstrapcdn.com |
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website
|
1 | cdnjs.cloudflare.com |
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website
|
1 | code.jquery.com |
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website
|
13 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ing.nl |
inlogcodes.mijn.ing.nl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website Sectigo RSA Domain Validation Secure Server CA |
2020-06-04 - 2021-06-04 |
a year | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
cloudflare.com CloudFlare Inc ECC CA-2 |
2020-01-07 - 2020-10-09 |
9 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/
Frame ID: 354BC1C6DECAEFF5A0CD4D18776405E0
Requests: 13 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
- script /(?:\/([\d.]+))?(?:\/js)?\/bootstrap(?:\.min)?\.js/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title: Meer over de nieuwe inlogpagina
Search URL Search Domain Scan URL
Title: Hulp nodig?
Search URL Search Domain Scan URL
Title: Veilig bankieren
Search URL Search Domain Scan URL
Title: Privacy en cookies
Search URL Search Domain Scan URL
Title: Disclaimer
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0-beta.2/css/ |
124 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo1.png
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
62 KB 62 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
alert-info.svg
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
599 B 488 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
menu-close.svg
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
354 B 405 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-chevron-open-right.svg
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
373 B 429 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.3/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0-beta.2/js/ |
49 KB 13 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.png
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
315 B 315 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ing.ttf
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
70 KB 36 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkbox.svg
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website/ |
285 B 379 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery function| Popper object| bootstrap function| removeDiv0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
code.jquery.com
ing-nl.toegang.inloggen.nieuwtoegangklanten-nl.website
maxcdn.bootstrapcdn.com
162.213.251.110
2001:4de0:ac19::1:b:1a
209.197.3.24
2606:4700::6810:84e5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