ing-twyp.com
Open in
urlscan Pro
185.162.171.120
Malicious Activity!
Public Scan
Submission: On August 01 via automatic, source openphish
Summary
This is the only time ing-twyp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 185.162.171.120 185.162.171.120 | 60458 (ASN-XTUDI...) (ASN-XTUDIONET) | |
1 | 209.197.3.24 209.197.3.24 | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 193.41.234.21 193.41.234.21 | 16289 (ING-DIREC...) (ING-DIRECT-SPAIN) | |
8 | 3 |
ASN20446 (HIGHWINDS3, US)
PTR: vip0x018.map2.ssl.hwcdn.net
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
ing-twyp.com
ing-twyp.com |
82 KB |
1 |
ingdirect.es
ing.ingdirect.es |
8 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
8 | 3 |
Domain | Requested by | |
---|---|---|
6 | ing-twyp.com |
ing-twyp.com
|
1 | ing.ingdirect.es |
ing-twyp.com
|
1 | code.jquery.com |
ing-twyp.com
|
8 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jquery.org COMODO RSA Domain Validation Secure Server CA |
2018-10-17 - 2020-10-16 |
2 years | crt.sh |
ing.ingdirect.es DigiCert SHA2 Extended Validation Server CA |
2020-07-09 - 2022-07-10 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
http://ing-twyp.com/app-login/
Frame ID: 515AEAF663C46360E41A69901FBEDAF3
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ing-twyp.com/app-login/ |
16 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.css
ing-twyp.com/app-login/ |
15 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.js
ing-twyp.com/app-login/ |
7 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ing-lion-reversed.svg
ing-twyp.com/app-login/ |
27 KB 13 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoING.svg
ing.ingdirect.es/app-login/assets/images/svg/ |
37 KB 8 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
INGMeWeb-Regular.woff2
ing-twyp.com/app-login/font/ |
29 KB 29 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
INGMeWeb-Bold.woff2
ing-twyp.com/app-login/font/ |
30 KB 30 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery function| isValidDate0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
ing-twyp.com
ing.ingdirect.es
185.162.171.120
193.41.234.21
209.197.3.24
1a77d762d62e1948dd5c2346672422e68cea346657fe350c42a30705721100cf
3a135f82b209a59959b162a1fbc9b0b38856d1332af286f86046b06357b3811e
6b3c4d3e255d73ca9e57959f5860c8357dbfad51249a6ee5a969c0d75f38f462
b1c6b16c89f0c078a7fd7e693f566c2aea0d72f6417ca29f76ad79d93744bb69
dd67a2dfc85b9420233f5be26725c2add66c389c5b3f1732eda08f094498f8b5
e008801612a41d04427fd522d313657cb123faf360e0a3821ac900c4b661f77e
f74c344733a85af20d2754b208f12309e2a30c591795d0881cb0ad94c4be6155
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d