bendigobank.com.au.blocked.wf
Open in
urlscan Pro
51.254.27.114
Malicious Activity!
Public Scan
Effective URL: https://bendigobank.com.au.blocked.wf/restore/
Submission: On August 31 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on August 28th 2022. Valid for: 3 months.
This is the only time bendigobank.com.au.blocked.wf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 76.223.86.4 76.223.86.4 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 51.254.27.114 51.254.27.114 | 16276 (OVH) (OVH) | |
4 | 74.125.24.147 74.125.24.147 | 15169 (GOOGLE) (GOOGLE) | |
4 | 142.251.12.94 142.251.12.94 | 15169 (GOOGLE) (GOOGLE) | |
12 | 4 |
ASN16509 (AMAZON-02, US)
PTR: abaa834e320054d4d.awsglobalaccelerator.com
rb.gy |
ASN16276 (OVH, FR)
PTR: server.smsalertuk.com
bendigobank.com.au.blocked.wf |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
gstatic.com
www.gstatic.com fonts.gstatic.com Failed |
335 KB |
4 |
google.com
www.google.com — Cisco Umbrella Rank: 2 |
25 KB |
1 |
blocked.wf
bendigobank.com.au.blocked.wf |
2 KB |
1 |
rb.gy
1 redirects
rb.gy — Cisco Umbrella Rank: 177233 |
237 B |
12 | 4 |
Domain | Requested by | |
---|---|---|
4 | www.gstatic.com |
www.google.com
www.gstatic.com |
4 | www.google.com |
bendigobank.com.au.blocked.wf
www.gstatic.com www.google.com |
1 | bendigobank.com.au.blocked.wf | |
1 | rb.gy | 1 redirects |
0 | fonts.gstatic.com Failed |
www.google.com
|
12 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bendigobank.com.au.blocked.wf R3 |
2022-08-28 - 2022-11-26 |
3 months | crt.sh |
www.google.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
*.google.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
This page contains 3 frames:
Primary Page:
https://bendigobank.com.au.blocked.wf/restore/
Frame ID: AB274B9F2971AAFE65E76966313D3CF4
Requests: 3 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfWdrUhAAAAABy8Kzloxk68hnR4RohWVZBaAWMV&co=aHR0cHM6Ly9iZW5kaWdvYmFuay5jb20uYXUuYmxvY2tlZC53Zjo0NDM.&hl=en&v=3TZgZIog-UsaFDv31vC4L9R_&size=normal&cb=2na5fj2dxus6
Frame ID: A579FAD8C2630CE1701622FDC40DF099
Requests: 8 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/bframe?hl=en&v=3TZgZIog-UsaFDv31vC4L9R_&k=6LfWdrUhAAAAABy8Kzloxk68hnR4RohWVZBaAWMV
Frame ID: 64DD865E14C75824BA9B85FF5B1AAD69
Requests: 3 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://rb.gy/tpwm8l
HTTP 301
https://bendigobank.com.au.blocked.wf/restore/ Page URL
Detected technologies
reCAPTCHA (Captchas) ExpandDetected patterns
- <div[^>]+class="g-recaptcha"
- /recaptcha/api\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://rb.gy/tpwm8l
HTTP 301
https://bendigobank.com.au.blocked.wf/restore/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bendigobank.com.au.blocked.wf/restore/ Redirect Chain
|
1 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
www.google.com/recaptcha/ |
850 B 967 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ |
387 KB 155 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
anchor
www.google.com/recaptcha/api2/ Frame A579 |
43 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles__ltr.css
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame A579 |
52 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame A579 |
387 KB 154 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame A579 |
14 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame A579 |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo_48.png
www.gstatic.com/recaptcha/api2/ Frame A579 |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v18/ Frame A579 |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bframe
www.google.com/recaptcha/api2/ Frame 64DD |
7 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
webworker.js
www.google.com/recaptcha/api2/ Frame A579 |
102 B 134 B |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
styles__ltr.css
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame 64DD |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame 64DD |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- fonts.gstatic.com
- URL
- https://fonts.gstatic.com/s/roboto/v18/KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
- Domain
- www.gstatic.com
- URL
- https://www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/styles__ltr.css
- Domain
- www.gstatic.com
- URL
- https://www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/recaptcha__en.js
Verdicts & Comments Add Verdict or Comment
Malicious
task.url
Submitted on
August 31st 2022, 9:12:28 am
UTC —
From Australia
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: Url shorter to known bendigo bank phishing
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| notRobot object| ___grecaptcha_cfg object| grecaptcha string| __recaptcha_api boolean| __google_recaptcha_client object| recaptcha object| closure_lm_9058030 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bendigobank.com.au.blocked.wf
fonts.gstatic.com
rb.gy
www.google.com
www.gstatic.com
fonts.gstatic.com
www.gstatic.com
142.251.12.94
51.254.27.114
74.125.24.147
76.223.86.4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