combank-recovery01a.com
Open in
urlscan Pro
164.92.211.222
Malicious Activity!
Public Scan
Effective URL: http://combank-recovery01a.com/dfsajsk.php?token=M0rHH8OxV4Ps2iqFHTIh2Hku2&step=1&loaded=true
Submission: On July 12 via manual from NL — Scanned from NL
Summary
This is the only time combank-recovery01a.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Commonwealth Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 3 | 164.92.211.222 164.92.211.222 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
5 | 2606:4700:303... 2606:4700:3035::6815:55a6 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 185.236.228.182 185.236.228.182 | 47674 (NETSOLUTIONS) (NETSOLUTIONS) | |
8 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
rbpagev2.in
rbpagev2.in |
40 KB |
3 |
combank-recovery01a.com
2 redirects
combank-recovery01a.com |
8 KB |
1 |
rbresults.pm
rbresults.pm |
269 B |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 350 |
31 KB |
8 | 4 |
Domain | Requested by | |
---|---|---|
5 | rbpagev2.in |
combank-recovery01a.com
rbpagev2.in |
3 | combank-recovery01a.com | 2 redirects |
1 | rbresults.pm |
ajax.googleapis.com
|
1 | ajax.googleapis.com |
combank-recovery01a.com
|
8 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.rbpagev2.in E1 |
2022-07-06 - 2022-10-04 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-06-06 - 2022-08-29 |
3 months | crt.sh |
rbresults.pm R3 |
2022-05-20 - 2022-08-18 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://combank-recovery01a.com/dfsajsk.php?token=M0rHH8OxV4Ps2iqFHTIh2Hku2&step=1&loaded=true
Frame ID: AE6872CEC9E4453AC8E5EC74A8CB26E5
Requests: 8 HTTP requests in this frame
Screenshot
Page Title
group-firstPage URL History Show full URLs
-
http://combank-recovery01a.com/
HTTP 302
http://combank-recovery01a.com/dfsajsk.php?a_failed=true&step=0 HTTP 302
http://combank-recovery01a.com/dfsajsk.php?token=M0rHH8OxV4Ps2iqFHTIh2Hku2&step=1&loaded=true Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- \.php(?:$|\?)
Google Font API (Font Scripts) Expand
Detected patterns
- googleapis\.com/.+webfont
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://combank-recovery01a.com/
HTTP 302
http://combank-recovery01a.com/dfsajsk.php?a_failed=true&step=0 HTTP 302
http://combank-recovery01a.com/dfsajsk.php?token=M0rHH8OxV4Ps2iqFHTIh2Hku2&step=1&loaded=true Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
dfsajsk.php
combank-recovery01a.com/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
rbpagev2.in/comm_live/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.0/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cba-logo.png
rbpagev2.in/comm_live/images/ |
3 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
rbpagev2.in/comm_live/assets/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loader.gif
rbpagev2.in/comm_live/images/ |
16 KB 16 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
helvetica-webfont.woff2
rbpagev2.in/comm_live/fonts/ |
19 KB 19 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
registerLiveUser
rbresults.pm/api/ |
0 269 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Commonwealth Bank (Banking)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| $ function| jQuery function| callsubmit1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
combank-recovery01a.com/ | Name: PHPSESSID Value: 8889372a5404b76e1de1fddb0f6c5517 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
combank-recovery01a.com
rbpagev2.in
rbresults.pm
164.92.211.222
185.236.228.182
2606:4700:3035::6815:55a6
2a00:1450:4001:810::200a
5d0f07d003f3df1da50b92670da82bbc986f036b026a46dc66fe20316376b9d7
aef69a73a19465ab8748f15238b5abd1198b7e39ad66287643c92743658fdcfa
e33f6f21fd27bdc7ed31a9b188176869820521f20fa27754e6ca50ac94fcb4d7
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
fce918d277758de4783b423cc97940d88031fdc2870336a4cfddf4970cf0a39e
fe940a4094535b261e65b9be3cef78fb5b45789db8c3f6289fcc0af7612fde08
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e