accntwebpagelogn.com
Open in
urlscan Pro
104.21.24.223
Malicious Activity!
Public Scan
Submission: On August 21 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by E1 on August 8th 2023. Valid for: 3 months.
This is the only time accntwebpagelogn.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 104.21.24.223 104.21.24.223 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 104.21.85.225 104.21.85.225 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
accntwebpagelogn.com
accntwebpagelogn.com |
199 KB |
3 |
f34r2345nrerfasq.top
f34r2345nrerfasq.top |
449 B |
11 | 2 |
Domain | Requested by | |
---|---|---|
7 | accntwebpagelogn.com |
accntwebpagelogn.com
|
3 | f34r2345nrerfasq.top |
accntwebpagelogn.com
|
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
accntwebpagelogn.com E1 |
2023-08-08 - 2023-11-06 |
3 months | crt.sh |
f34r2345nrerfasq.top E1 |
2023-06-28 - 2023-09-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://accntwebpagelogn.com/bendlilgobnk/l0g0n0nly/
Frame ID: D12D7E35A5284FA9DAC751407EF20638
Requests: 9 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
accntwebpagelogn.com/bendlilgobnk/l0g0n0nly/ |
38 KB 12 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.css
accntwebpagelogn.com/assets/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
accntwebpagelogn.com/assets/js/ |
29 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
accntwebpagelogn.com/assets/js/ |
87 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
browser.js
accntwebpagelogn.com/assets/js/ |
2 KB 1012 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.js
accntwebpagelogn.com/assets/js/ |
54 KB 19 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
switchnow.jpg
accntwebpagelogn.com/assets/img/ |
120 KB 120 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
detect
f34r2345nrerfasq.top/api/ |
0 449 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
detect
f34r2345nrerfasq.top/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
POST |
check-action
f34r2345nrerfasq.top/api/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
check-action
f34r2345nrerfasq.top/api/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- f34r2345nrerfasq.top
- URL
- https://f34r2345nrerfasq.top/api/check-action
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| axios function| $ function| jQuery object| BrowserDetect function| _0x3011e1 function| _0xae6f10 function| _0x27cf function| _0x1255 function| rand0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
accntwebpagelogn.com
f34r2345nrerfasq.top
f34r2345nrerfasq.top
104.21.24.223
104.21.85.225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