bendigo-verification.com
Open in
urlscan Pro
2a02:4780:b:861:0:2d58:e45f:1
Malicious Activity!
Public Scan
Effective URL: https://bendigo-verification.com/pages
Submission: On August 04 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by ZeroSSL RSA Domain Secure Site CA on August 3rd 2022. Valid for: 3 months.
This is the only time bendigo-verification.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 10 | 2a02:4780:b:8... 2a02:4780:b:861:0:2d58:e45f:1 | 47583 (AS-HOSTINGER) (AS-HOSTINGER) | |
10 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
bendigo-verification.com
1 redirects
bendigo-verification.com |
75 KB |
0 |
bendigobank.com.au
Failed
banking.bendigobank.com.au Failed |
|
10 | 2 |
Domain | Requested by | |
---|---|---|
10 | bendigo-verification.com |
1 redirects
bendigo-verification.com
|
0 | banking.bendigobank.com.au Failed |
bendigo-verification.com
|
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.bendigobank.com.au |
demo.bendigobank.com.au |
Subject Issuer | Validity | Valid | |
---|---|---|---|
bendigo-verification.com ZeroSSL RSA Domain Secure Site CA |
2022-08-03 - 2022-11-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bendigo-verification.com/pages
Frame ID: AAC022644052FB4F35872682EFD51259
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Bendigo Bank - Logon to e-bankingPage URL History Show full URLs
-
https://bendigo-verification.com/
HTTP 302
https://bendigo-verification.com/pages Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: See all Help Topics
Search URL Search Domain Scan URL
Title: Take a tour
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bendigo-verification.com/
HTTP 302
https://bendigo-verification.com/pages Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
pages
bendigo-verification.com/ Redirect Chain
|
29 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles.css
bendigo-verification.com/front_end/front_end_files/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.js
bendigo-verification.com/js/cntdjs/ |
87 KB 29 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.mask.js
bendigo-verification.com/js/cntdjs/ |
23 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cntd.js
bendigo-verification.com/js/cntdjs/ |
3 KB 947 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading.js
bendigo-verification.com/js/shared/ |
2 KB 701 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
online_status.js
bendigo-verification.com/js/shared/ |
998 B 445 B |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
kb-banner.jpg
banking.bendigobank.com.au/static/assets/images/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
proximanova-regular__510298c5f4.woff2
bendigo-verification.com/front_end/front_end_files/ |
12 KB 12 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
proximanova-bold__aac7e61091.woff2
bendigo-verification.com/front_end/front_end_files/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- banking.bendigobank.com.au
- URL
- https://banking.bendigobank.com.au/static/assets/images/kb-banner.jpg
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation string| urlroot string| uniqueid function| $ function| jQuery object| controller1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
bendigo-verification.com/ | Name: PHPSESSID Value: e169a6fe118e58946f03438816ddb414 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | upgrade-insecure-requests |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
banking.bendigobank.com.au
bendigo-verification.com
banking.bendigobank.com.au
2a02:4780:b:861:0:2d58:e45f:1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