ing.betaalservice.me
Open in
urlscan Pro
199.188.201.16
Malicious Activity!
Public Scan
Submission: On May 28 via manual from NL
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on May 28th 2020. Valid for: a year.
This is the only time ing.betaalservice.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 23 | 199.188.201.16 199.188.201.16 | 22612 (NAMECHEAP...) (NAMECHEAP-NET) | |
6 | 104.108.165.66 104.108.165.66 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
30 | 4 |
ASN22612 (NAMECHEAP-NET, US)
PTR: server274-1.web-hosting.com
ing.betaalservice.me |
ASN16625 (AKAMAI-AS, US)
PTR: a104-108-165-66.deploy.static.akamaitechnologies.com
www.ing.be |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
betaalservice.me
6 redirects
ing.betaalservice.me |
83 KB |
6 |
ing.be
www.ing.be |
|
1 |
jquery.com
code.jquery.com |
81 KB |
30 | 3 |
Domain | Requested by | |
---|---|---|
23 | ing.betaalservice.me |
6 redirects
ing.betaalservice.me
code.jquery.com |
6 | www.ing.be |
ing.betaalservice.me
|
1 | code.jquery.com |
ing.betaalservice.me
|
30 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ing.nl |
inlogcodes.mijn.ing.nl |
aanvragen.ing.nl |
Subject Issuer | Validity | Valid | |
---|---|---|---|
ing.betaalservice.me Sectigo RSA Domain Validation Secure Server CA |
2020-05-28 - 2021-05-28 |
a year | crt.sh |
www.ing.be Entrust Certification Authority - L1M |
2018-08-21 - 2020-08-19 |
2 years | crt.sh |
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://ing.betaalservice.me/nl/retail/login
Frame ID: 4E755205337FF5BA4C8558F8DDA1354E
Requests: 31 HTTP requests in this frame
9 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Lees verder
Search URL Search Domain Scan URL
Title: Wachtwoord en/of gebruikersnaam vergeten?
Search URL Search Domain Scan URL
Title: Mijn ING aanvragen
Search URL Search Domain Scan URL
Title: Inloggegevens niet meer onthouden, lees hoe
Search URL Search Domain Scan URL
Title: Contact met ING
Search URL Search Domain Scan URL
Title: Veilig bankieren
Search URL Search Domain Scan URL
Title: Privacy en cookies
Search URL Search Domain Scan URL
Title: Disclaimer
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://ing.betaalservice.me/nl/retail/Betaal%20met%20Mijn%20ING%20-%20iDEAL%20Inloggen_bestanden/alert-info.svg HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/nl/retail/assets/menu-close.svg HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/nl/retail/Betaal%20met%20Mijn%20ING%20-%20iDEAL%20Inloggen_bestanden/alert-error.svg HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/img/alert-error.svg/img/alert-error.svg HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/nl/retail/assets/illustratie_algemenestoring.png HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/ING_HalfLion_Reversed.svg HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/fonts/5.woff2 HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/fonts/1.woff2 HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/fonts/6.woff HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/fonts/2.woff HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/fonts/3.ttf HTTP 302
- https://www.ing.be/404
- https://ing.betaalservice.me/public/ing/css/fonts/7.ttf HTTP 302
- https://www.ing.be/404
30 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
login
ing.betaalservice.me/nl/retail/ |
17 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
ing.betaalservice.me/public/ing/css/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pwdfnt.css
ing.betaalservice.me/public/ing/css/ |
162 KB 65 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ing-logo.svg
ing.betaalservice.me/public/ing/img/ |
11 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo-ideal.svg
ing.betaalservice.me/public/ing/img/ |
3 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
checkbox.svg
ing.betaalservice.me/public/ing/img/ |
281 B 377 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow-chevron-open-right.svg
ing.betaalservice.me/public/ing/img/ |
366 B 427 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
404
www.ing.be/ Redirect Chain
|
0 0 |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headersRedirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
24 KB 24 KB |
Font
application/font-woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET |
404
www.ing.be/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 196 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 259 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 196 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 259 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 196 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 196 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 259 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 196 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 259 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
heartbeat
ing.betaalservice.me/ |
0 196 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
- Domain
- www.ing.be
- URL
- https://www.ing.be/404
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery number| interval function| doAjax1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
ing.betaalservice.me/ | Name: PHPSESSID Value: 27b4d5d1b82ba9da44a60b209bc0cf52 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ing.betaalservice.me
www.ing.be
www.ing.be
104.108.165.66
199.188.201.16
2001:4de0:ac19::1:b:3a
3341e8fbc2735887ec100c965c510ab15e46cc75ac55cd7efc4e63ff6826ed17
532de4f1bbf77ff1445ab24e142be64e9ee1cc8820c1fc0afecef3924ddf6f92
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
6b80296141a1137a67f4eb559196937efe42c85d54c13d1ecda26736a4beffd5
8bdc5597facee6e3f376168d4b20c5ca04cb88f66ff5ac1c1f936b6a92240f3d
c40c32284db736cf15432a4da1684b391bb82d244589b2001f83a4cbd8e984bb
c7ddda47b321052e5b083bb6200194f9a0a536999ea15e4348ff56c43176c026
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
e86ba4f8dd6a82f423fbc44a456b3849eab753d9cee1057159093b9005ecb711
fbea558fb96f7895b187c7ce9199fec546e443eecee4127f66cb526824c392d6