grupogiezi.com
Open in
urlscan Pro
165.227.124.226
Malicious Activity!
Public Scan
Effective URL: https://grupogiezi.com/login
Submission: On November 06 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by AlphaSSL CA - SHA256 - G4 on February 23rd 2023. Valid for: a year.
This is the only time grupogiezi.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 103.150.135.180 103.150.135.180 | 140576 (VPSBLOCKS...) (VPSBLOCKSPTYLTD-AS-AP VPSBlocks Pty Ltd) | |
11 | 165.227.124.226 165.227.124.226 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
2 | 151.101.1.229 151.101.1.229 | 54113 (FASTLY) (FASTLY) | |
13 | 2 |
ASN140576 (VPSBLOCKSPTYLTD-AS-AP VPSBlocks Pty Ltd, AU)
PTR: vps.fleacontrolmelbourne.com.au
fleacontrolmelbourne.com.au |
ASN14061 (DIGITALOCEAN-ASN, US)
PTR: xpcp19005.xpress.com.mx
grupogiezi.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
grupogiezi.com
grupogiezi.com |
166 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 335 |
283 KB |
1 |
fleacontrolmelbourne.com.au
1 redirects
fleacontrolmelbourne.com.au |
249 B |
13 | 3 |
Domain | Requested by | |
---|---|---|
11 | grupogiezi.com |
grupogiezi.com
|
2 | cdn.jsdelivr.net |
grupogiezi.com
|
1 | fleacontrolmelbourne.com.au | 1 redirects |
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.grupogiezi.com AlphaSSL CA - SHA256 - G4 |
2023-02-23 - 2024-03-26 |
a year | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://grupogiezi.com/login
Frame ID: 656E2286B9A6F4C179A88E9D3696487B
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Bendigo Bank - Log in to e-bankingPage URL History Show full URLs
-
https://fleacontrolmelbourne.com.au/ass9d
HTTP 301
https://grupogiezi.com/login Page URL
Detected technologies
jsDelivr (CDN) ExpandDetected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
reCAPTCHA (Captchas) Expand
Detected patterns
- <div[^>]+class="g-recaptcha"
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://fleacontrolmelbourne.com.au/ass9d
HTTP 301
https://grupogiezi.com/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
grupogiezi.com/ Redirect Chain
|
12 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
cdn.jsdelivr.net/npm/axios/dist/ |
32 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tailwind.min.css
cdn.jsdelivr.net/npm/tailwindcss@2.2.16/dist/ |
3 MB 270 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
grupogiezi.com/css/ |
500 B 542 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.css
grupogiezi.com/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.css
grupogiezi.com/css/ |
620 B 631 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
grupogiezi.com/assets/images/images/ |
6 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
phone.svg
grupogiezi.com/assets/images/icons/ |
629 B 627 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
user.png
grupogiezi.com/assets/images/icons/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
password.png
grupogiezi.com/assets/images/icons/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-store.svg
grupogiezi.com/assets/images/images/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
play-store.svg
grupogiezi.com/assets/images/images/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bottom-banner.jpg
grupogiezi.com/assets/images/images/ |
120 KB 120 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
task.url
Submitted on
November 6th 2023, 11:38:44 pm
UTC —
From Australia
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: confirmed phishing email link targeting bendigo bank
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| axios2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
grupogiezi.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Ii9Ib3dFKyt1WFdlNVMxZlNMaC8rc0E9PSIsInZhbHVlIjoiSU94d1RTUUtXTGJaMnhydUVFRWFsOEE1YmVQc2NPaDJQcXB2S1dYUFhEUGxvU3orcDJWUTVLcVBob3dvUlhZd2I0MlVuLzRmNkI3V3pmUzQ3anNqeGwwdXdGUDMyVUh0VmIvZVpIQklSNW9PVVVCZnRDSUIwYTNyVmtQdGhUWUciLCJtYWMiOiI3NDliNTQyYTkxYTNkNGU0N2Y0YzdiNTEzM2JhZmUwYjdiMTAyZTgwYmJmOThhYmU3ZWIxNGQ2Njg0ODUxNmFhIiwidGFnIjoiIn0%3D |
|
grupogiezi.com/ | Name: bendigo_bank_session Value: eyJpdiI6IlV1QkN0cGJud2hGRjNqQ2tTUXdhRUE9PSIsInZhbHVlIjoiY3U3UktFUklnTjd1YTN3R216TCt1K1hMUUkzdzQ0VlFXeU5nT2N1WXlQbWt3c2RLRWNzbHc5NC9uMk5HWjBRWTFJdUpmQ2NTTHhZT0FHM3A0UzByNFF5MThqbFpaazB3eFVzMzd2VDdiL3NvVzJrUzdJM013a2Q4ZnVnZVdtTG0iLCJtYWMiOiJmYzFkZGViOWUyMmRhM2QxOGNjNWM1MzRlZjczYmNiMzVlZDg0ZmFjZjQ3YTJhYzQxZDRjMDk5N2ExNDdiZTQwIiwidGFnIjoiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
fleacontrolmelbourne.com.au
grupogiezi.com
103.150.135.180
151.101.1.229
165.227.124.226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