www.ykkindia.com
Open in
urlscan Pro
13.127.163.248
Malicious Activity!
Public Scan
Submission: On June 25 via automatic, source openphish
Summary
This is the only time www.ykkindia.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 13.127.163.248 13.127.163.248 | 16509 (AMAZON-02) (AMAZON-02 - Amazon.com) | |
4 | 1 |
ASN16509 (AMAZON-02 - Amazon.com, Inc., US)
PTR: ec2-13-127-163-248.ap-south-1.compute.amazonaws.com
www.ykkindia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
ykkindia.com
www.ykkindia.com |
102 KB |
4 | 1 |
Domain | Requested by | |
---|---|---|
4 | www.ykkindia.com |
www.ykkindia.com
|
4 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.ykkindia.com/images/ING_new/a644e/
Frame ID: 120B2CFBD0A6E6BAA42EC2BE02001C6B
Requests: 4 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.ykkindia.com/images/ING_new/a644e/ |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
www.ykkindia.com/images/ING_new/a644e/img/ |
97 KB 97 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_Button1_bkgrnd.png
www.ykkindia.com/images/ING_new/a644e/images/ |
250 B 250 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_Button1_bkgrnd.png
www.ykkindia.com/images/ING_new/a644e/img/ |
247 B 247 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| test0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.ykkindia.com
13.127.163.248
3d23608cc300429a53f735daa7b18250ce06675a748a0c819135c1e5a952b8a7
4a0992ee97e271448d2f94b172e5399462e86c04ff11f4a6f5ade68fac1a1f06
6f4add59651e14064d4be004d6fc7093fe1b27460eae01f49313ed49a68060b9
e45710f2a5f0364155c056f6095c214a907d6476b5620481dfdd937ae8edc87d