grupogiezi.com
Open in
urlscan Pro
165.227.124.226
Malicious Activity!
Public Scan
Submission: On November 07 via manual from AU — Scanned from AU
Summary
TLS certificate: Issued by AlphaSSL CA - SHA256 - G4 on February 23rd 2023. Valid for: a year.
This is the only time grupogiezi.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bendigo Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 165.227.124.226 165.227.124.226 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
2 | 151.101.129.229 151.101.129.229 | 54113 (FASTLY) (FASTLY) | |
13 | 2 |
ASN14061 (DIGITALOCEAN-ASN, US)
PTR: xpcp19005.xpress.com.mx
grupogiezi.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
grupogiezi.com
grupogiezi.com |
166 KB |
2 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 335 |
283 KB |
13 | 2 |
Domain | Requested by | |
---|---|---|
11 | grupogiezi.com |
grupogiezi.com
|
2 | cdn.jsdelivr.net |
grupogiezi.com
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.grupogiezi.com AlphaSSL CA - SHA256 - G4 |
2023-02-23 - 2024-03-26 |
a year | crt.sh |
jsdelivr.net GlobalSign Atlas R3 DV TLS CA 2023 Q3 |
2023-09-27 - 2024-10-28 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://grupogiezi.com/login
Frame ID: 4674A0B0D82DE4D0EF590E5627DFCB8C
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
Bendigo Bank - Log in to e-bankingDetected technologies
jsDelivr (CDN) ExpandDetected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
reCAPTCHA (Captchas) Expand
Detected patterns
- <div[^>]+class="g-recaptcha"
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
login
grupogiezi.com/ |
12 KB 13 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
cdn.jsdelivr.net/npm/axios/dist/ |
32 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tailwind.min.css
cdn.jsdelivr.net/npm/tailwindcss@2.2.16/dist/ |
3 MB 270 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app.css
grupogiezi.com/css/ |
500 B 542 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
footer.css
grupogiezi.com/css/ |
8 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loader.css
grupogiezi.com/css/ |
620 B 631 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
grupogiezi.com/assets/images/images/ |
6 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
phone.svg
grupogiezi.com/assets/images/icons/ |
629 B 627 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
user.png
grupogiezi.com/assets/images/icons/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
password.png
grupogiezi.com/assets/images/icons/ |
10 KB 10 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-store.svg
grupogiezi.com/assets/images/images/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
play-store.svg
grupogiezi.com/assets/images/images/ |
7 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bottom-banner.jpg
grupogiezi.com/assets/images/images/ |
120 KB 120 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bendigo Bank (Banking)2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture function| axios2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
grupogiezi.com/ | Name: XSRF-TOKEN Value: eyJpdiI6Im1xNTAzcVZrWEJBOHRId1BaUXFycHc9PSIsInZhbHVlIjoiWUt5R1pveVluenRDWjgwOWFybFdCL0c4WlN6Q3pDSSt3RVNwQk9BRk9HMHo0NTZZQlZiYUVJQ214Z3BWZ1dNNVYvaU5pOFlQM3p2RkovZHFndUY2UC9MZVRCa2kwbWtTc0FEQWEvWkcwcmtlS0k4TlBVTEtoc2wyMW4yU1hKMDEiLCJtYWMiOiI4MzYzYWVhYTgwNzU1NzIyZmU0YzdhNmZhZjUzNWY4MDY3NmRjNDc2N2FhMmU4YzQ4N2U2MDBjOGVhNGMxMzFjIiwidGFnIjoiIn0%3D |
|
grupogiezi.com/ | Name: bendigo_bank_session Value: eyJpdiI6IkgyeWI3dUdpNkFlSEFLQTkxNjR5RWc9PSIsInZhbHVlIjoiMXVPamFGRG5mTGhGSkxCNmlRZTlha0EweVpCZTdiVDBnejlGb20zMGVhbDVaZlpIM3BTeUVzWDFMb2FCclJlU1V5MFpMZGNxQloyd3gwaHpSU2xWcTRLSGU4YjZyb0dhc1JYYWlORkN0cDh4Qkt0VVNmTjRoLzdsMGlCdFYxVlUiLCJtYWMiOiJlNGRlMDlhMGFkZjNmYzhmYzUzNTRiYmZhMTA2MmZhZTU5NzRkMmE5ZTExOWQ0ZThkNDA4MDcxMzRlZGUwOGU3IiwidGFnIjoiIn0%3D |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
grupogiezi.com
151.101.129.229
165.227.124.226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