www.bellman.com.tw
Open in
urlscan Pro
103.118.26.53
Malicious Activity!
Public Scan
Effective URL: https://www.bellman.com.tw/ibank/ro/login/?client_id=4bdc78faa75bd089&appIdKey=4bdc78faa75bd0898a9ad63466a201d467e146f7&cou...
Submission: On October 09 via manual from TW — Scanned from DE
Summary
TLS certificate: Issued by Sectigo RSA Domain Validation Secure ... on August 18th 2023. Valid for: a year.
This is the only time www.bellman.com.tw was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 25 | 103.118.26.53 103.118.26.53 | 131626 (NSS-GROUP...) (NSS-GROUP-AS-TW NSS INTL CO.) | |
23 | 1 |
ASN131626 (NSS-GROUP-AS-TW NSS INTL CO., LTD., TW)
PTR: sp1.coowo.com
www.bellman.com.tw |
Apex Domain Subdomains |
Transfer | |
---|---|---|
25 |
bellman.com.tw
2 redirects
www.bellman.com.tw |
2 MB |
23 | 1 |
Domain | Requested by | |
---|---|---|
25 | www.bellman.com.tw |
2 redirects
www.bellman.com.tw
|
23 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.bellman.com.tw Sectigo RSA Domain Validation Secure Server CA |
2023-08-18 - 2024-09-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.bellman.com.tw/ibank/ro/login/?client_id=4bdc78faa75bd089&appIdKey=4bdc78faa75bd0898a9ad63466a201d467e146f7&country=RO
Frame ID: 62AEA57649044A5F45C15EA0A1827C64
Requests: 23 HTTP requests in this frame
Screenshot
Page Title
OTP Bank România - OTPdirektPage URL History Show full URLs
-
http://www.bellman.com.tw/ibank/ro/index.php?pwd=otpbank
HTTP 302
https://www.bellman.com.tw/ibank/ro/index.php?pwd=otpbank HTTP 302
https://www.bellman.com.tw/ibank/ro/login/?client_id=4bdc78faa75bd089&appIdKey=4bdc78faa75bd0898a9ad634... Page URL
Detected technologies
AngularJS (JavaScript Frameworks) ExpandDetected patterns
- \bangular.{0,32}\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.bellman.com.tw/ibank/ro/index.php?pwd=otpbank
HTTP 302
https://www.bellman.com.tw/ibank/ro/index.php?pwd=otpbank HTTP 302
https://www.bellman.com.tw/ibank/ro/login/?client_id=4bdc78faa75bd089&appIdKey=4bdc78faa75bd0898a9ad63466a201d467e146f7&country=RO Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
23 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.bellman.com.tw/ibank/ro/login/ Redirect Chain
|
36 KB 37 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
angular.min.js
www.bellman.com.tw/ibank/ro/login/css/js/ |
163 KB 163 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
www.bellman.com.tw/ibank/ro/login/css/js/ |
86 KB 86 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.CardValidator.js
www.bellman.com.tw/ibank/ro/login/css/js/ |
6 KB 7 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.validate.min.js
www.bellman.com.tw/ibank/ro/login/css/js/ |
23 KB 23 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mask.js
www.bellman.com.tw/ibank/ro/login/css/js/ |
18 KB 18 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.js
www.bellman.com.tw/ibank/ro/login/css/js/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
styles.fc87f9711a04827ba23d.css
www.bellman.com.tw/ibank/ro/login/css/ |
407 KB 407 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.0ab3f9c00b32b56bdcce.svg
www.bellman.com.tw/ibank/ro/login/css/ |
6 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
lang.40d3610592d212718a56.png
www.bellman.com.tw/ibank/ro/login/css/ |
511 B 774 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
header-banner.069f3518f5eb1e1911a4.png
www.bellman.com.tw/ibank/ro/login/css/ |
243 KB 243 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular.9ccd5e1b1dbea150336d.ttf
www.bellman.com.tw/ibank/ro/login/css/ |
212 KB 212 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
checkbox-sprite.2a98960350f8817b814a.svg
www.bellman.com.tw/ibank/ro/login/css/ |
1 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
computer-bulb.35727d7f0f94ffc1e1f8.svg
www.bellman.com.tw/ibank/ro/login/css/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
google-play.57426d86244898e1005e.jpg
www.bellman.com.tw/ibank/ro/login/css/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
arrow-up-gr.be84cf0c3a638d74adea.png
www.bellman.com.tw/ibank/ro/login/css/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
otp-googleplay.dbba68dd0f8346caf837.png
www.bellman.com.tw/ibank/ro/login/css/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
app-store.10dbd5ec84831005ce61.jpg
www.bellman.com.tw/ibank/ro/login/css/ |
19 KB 19 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
otp-appstore.5ff53d45eb70bf983651.png
www.bellman.com.tw/ibank/ro/login/css/ |
6 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
large-telephone.1b3c9f3cd1e8f76c3212.svg
www.bellman.com.tw/ibank/ro/login/css/ |
4 KB 5 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
best-performance.9f3dcb628e940f0626f0.png
www.bellman.com.tw/ibank/ro/login/css/ |
34 KB 34 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Bold.fc10ccf11a61bac919b9.ttf
www.bellman.com.tw/ibank/ro/login/css/ |
219 KB 219 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-SemiBold.d31d0aaa8d4384de5eeb.ttf
www.bellman.com.tw/ibank/ro/login/css/ |
216 KB 216 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
October 16th 2023, 12:59:01 pm
UTC —
From Hungary
Threats:
Brand Impersonation
Phishing
Scam
Brands:
OTP Bank
HU
Comment: The website impersonates the visual elements of the OTP Bank HU.
Phishing website.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| angular function| $ function| jQuery function| preventBack1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.bellman.com.tw/ | Name: PHPSESSID Value: 9i8v1tpr6l6vlh8kb8lfou1r00 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.bellman.com.tw
103.118.26.53
0279b4163ca0d6df05c1f50b63f192da41f82a0c48b6872e8671dec485df6dd7
0843c0022b38ec88f3dd8e9550640c9d6dd1f7694938b043d2bdfb9ab4ed8d25
08b9313ae3a0e304276cf288156430ea28aac34429547636fffbced628b69e86
0bb1c99334f19063508f59e51b9e399c4a963c5bfb9432caf95ea74b68f2a01c
13c03e22a633919beb2847c58c8285fb8a735ee97097d7c48fd403f8294b05f8
163f633138ab7c52b3122f3e2d31a549ffe78c50802ffdbd020037d7f5f3d9ee
1b43de2449d39b65ff6f63315d4afda585f72fbbec2e3d9a56f59de6c75149d3
2b381363dda049f2d49a59037b228bc865d51ffb977c8f5c3547d5c28de48e3a
331ba493a986b0dc43707b18edc12d11395f5d7c0154fcbcba452322bd7f1d50
4cfb986c2462761889ee2f9ccdd10f7663c3963888657ed80b60016e023dbd3e
570376fe755943715cf3477908a205c43de4f06b4228498a24b8b8acd31ecda5
6036cafde2d6c2252a04fc7fa4558f3e892279a7b7d69f367191fcbaccce2ace
67196b01a16eb607a423d7463b4ef3b27ea4ea5457525c4afcd02a7379f400a5
8c50aa8567731858e81bcfd2027718d9a7c8fd7bf54cf496499adbf5da5741b9
aa349073e9de665fcfd4eb7ed5c0a6703e79ac2db86e87a2cb9047fc63360466
b4c2050b25d3d296d5cf58589ca00816dc72df42262c2f629d5c6a984a161aa4
b73d54cfd940958d4195896db51cc3377b63d3353915c79c13b0aa892865765b
bfa489820b4cff47140a8f1741f50f8bf752df013ac13388357ccef04600c8ab
c74570c0140e315fbcb8c3c64763eb648b6ccb0448c65dc1560bd889918fb10a
cd52dc073bbf1f874ab284a63297a14f67477be276d1a11388323df1d1fba36a
cf1f0d954cbbbcb32d170b1ff68c5b082a1086f34f2bbee825ca88b7c9fb213a
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f050012b033cb391112b37757113c73ff09884815ff73ce45592ee309ce87b3f