bendigobank.com.au.blocked.wf
Open in
urlscan Pro
51.254.27.114
Malicious Activity!
Public Scan
Submission: On August 28 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by R3 on August 28th 2022. Valid for: 3 months.
This is the only time bendigobank.com.au.blocked.wf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 2 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 51.254.27.114 51.254.27.114 | 16276 (OVH) (OVH) | |
4 | 142.251.12.105 142.251.12.105 | 15169 (GOOGLE) (GOOGLE) | |
7 | 74.125.24.94 74.125.24.94 | 15169 (GOOGLE) (GOOGLE) | |
12 | 4 |
ASN16276 (OVH, FR)
PTR: server.smsalertuk.com
bendigobank.com.au.blocked.wf |
ASN15169 (GOOGLE, US)
PTR: sf-in-f94.1e100.net
www.gstatic.com | |
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
gstatic.com
www.gstatic.com fonts.gstatic.com |
529 KB |
4 |
google.com
www.google.com — Cisco Umbrella Rank: 9 |
25 KB |
2 |
blocked.wf
1 redirects
bendigobank.com.au.blocked.wf |
2 KB |
12 | 3 |
Domain | Requested by | |
---|---|---|
6 | www.gstatic.com |
www.google.com
www.gstatic.com |
4 | www.google.com |
bendigobank.com.au.blocked.wf
www.gstatic.com www.google.com |
2 | bendigobank.com.au.blocked.wf | 1 redirects |
1 | fonts.gstatic.com |
www.google.com
|
12 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bendigobank.com.au.blocked.wf R3 |
2022-08-28 - 2022-11-26 |
3 months | crt.sh |
www.google.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
*.google.com GTS CA 1C3 |
2022-08-08 - 2022-10-31 |
3 months | crt.sh |
This page contains 3 frames:
Primary Page:
https://bendigobank.com.au.blocked.wf/restore/
Frame ID: 8367C2003C3F80A0B4DA47091C524A5F
Requests: 3 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/anchor?ar=1&k=6LfWdrUhAAAAABy8Kzloxk68hnR4RohWVZBaAWMV&co=aHR0cHM6Ly9iZW5kaWdvYmFuay5jb20uYXUuYmxvY2tlZC53Zjo0NDM.&hl=en&v=3TZgZIog-UsaFDv31vC4L9R_&size=normal&cb=yaxnfavasr9l
Frame ID: DDB58A9C1A94327A4753BECEEC7E9210
Requests: 8 HTTP requests in this frame
Frame:
https://www.google.com/recaptcha/api2/bframe?hl=en&v=3TZgZIog-UsaFDv31vC4L9R_&k=6LfWdrUhAAAAABy8Kzloxk68hnR4RohWVZBaAWMV
Frame ID: BB3A509B89DEDADCA6AB57BC3F4E9683
Requests: 3 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://bendigobank.com.au.blocked.wf/restore
HTTP 301
https://bendigobank.com.au.blocked.wf/restore/ Page URL
Detected technologies
reCAPTCHA (Captchas) ExpandDetected patterns
- <div[^>]+class="g-recaptcha"
- /recaptcha/api\.js
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://bendigobank.com.au.blocked.wf/restore
HTTP 301
https://bendigobank.com.au.blocked.wf/restore/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
bendigobank.com.au.blocked.wf/restore/ Redirect Chain
|
1 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
www.google.com/recaptcha/ |
850 B 967 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ |
387 KB 155 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
anchor
www.google.com/recaptcha/api2/ Frame DDB5 |
43 KB 23 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles__ltr.css
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame DDB5 |
52 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame DDB5 |
387 KB 154 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame DDB5 |
14 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ Frame DDB5 |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo_48.png
www.gstatic.com/recaptcha/api2/ Frame DDB5 |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v18/ Frame DDB5 |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
webworker.js
www.google.com/recaptcha/api2/ Frame DDB5 |
102 B 134 B |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bframe
www.google.com/recaptcha/api2/ Frame BB3A |
7 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
styles__ltr.css
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame BB3A |
52 KB 24 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
recaptcha__en.js
www.gstatic.com/recaptcha/releases/3TZgZIog-UsaFDv31vC4L9R_/ Frame BB3A |
387 KB 154 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.domain
Submitted on
August 28th 2022, 9:04:28 pm
UTC —
From Australia
Threats:
Phishing
Brands:
Bendigo Bank
AU
Comment: Confirmed sms phishing targeting bendigo bank
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| notRobot object| ___grecaptcha_cfg object| grecaptcha string| __recaptcha_api boolean| __google_recaptcha_client object| recaptcha object| closure_lm_6177920 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bendigobank.com.au.blocked.wf
fonts.gstatic.com
www.google.com
www.gstatic.com
142.251.12.105
51.254.27.114
74.125.24.94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