ingbdirect.com
Open in
urlscan Pro
107.180.56.175
Malicious Activity!
Public Scan
Submission: On July 02 via automatic, source openphish
Summary
This is the only time ingbdirect.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ING Group (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 107.180.56.175 107.180.56.175 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
1 | 104.111.234.198 104.111.234.198 | 16625 (AKAMAI-AS) (AKAMAI-AS - Akamai Technologies) | |
1 | 45.40.130.22 45.40.130.22 | 26496 (AS-26496-...) (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com) | |
6 | 3 |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-107-180-56-175.ip.secureserver.net
ingbdirect.com |
ASN16625 (AKAMAI-AS - Akamai Technologies, Inc., US)
PTR: a104-111-234-198.deploy.static.akamaitechnologies.com
img1.wsimg.com |
ASN26496 (AS-26496-GO-DADDY-COM-LLC - GoDaddy.com, LLC, US)
PTR: ip-45-40-130-22.ip.secureserver.net
img.secureserver.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
ingbdirect.com
1 redirects
ingbdirect.com |
100 KB |
1 |
secureserver.net
img.secureserver.net |
585 B |
1 |
wsimg.com
img1.wsimg.com |
5 KB |
6 | 3 |
Domain | Requested by | |
---|---|---|
5 | ingbdirect.com |
1 redirects
ingbdirect.com
|
1 | img.secureserver.net | |
1 | img1.wsimg.com |
ingbdirect.com
|
6 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://ingbdirect.com/po/022ab/
Frame ID: F9FBB7CA595DC89101C62D011A9DDF85
Requests: 6 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://ingbdirect.com/po/022ab
HTTP 301
http://ingbdirect.com/po/022ab/ Page URL
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|)HTTPD)/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://ingbdirect.com/po/022ab
HTTP 301
http://ingbdirect.com/po/022ab/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
ingbdirect.com/po/022ab/ Redirect Chain
|
5 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET S |
tcc_l.combined.1.0.6.min.js
img1.wsimg.com/tcc/ |
12 KB 5 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
ingbdirect.com/po/022ab/img/ |
97 KB 97 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_Button1_bkgrnd.png
ingbdirect.com/po/022ab/images/ |
357 B 357 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index_Button1_bkgrnd.png
ingbdirect.com/po/022ab/img/ |
354 B 354 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
event
img.secureserver.net/t/1/tl/ |
43 B 585 B |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ING Group (Banking)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| test object| _trfd function| tcg function| tcp object| perfhandler object| TCCTracker object| _trfq object| true0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
img.secureserver.net
img1.wsimg.com
ingbdirect.com
104.111.234.198
107.180.56.175
45.40.130.22
a065920df8cc4016d67c3a464be90099c9d28ffe7c9e6ee3a18f257efc58cbd7
aa5c1ec4d2ea00eb517eadeb3b65e55b577b7a5ed42d7c2611d15d9050c18350
bad1fe6dfe2aa90c9d5859894dbd746bd96477292b3a42832cd7cb29e61234b3
e45710f2a5f0364155c056f6095c214a907d6476b5620481dfdd937ae8edc87d
e74fd323124cfc91719b79be827cca5b96a9d46840b9b0b4c7d98b1f47361a29
f4907c6a69a0aefd06c05556fd521ce2ede59c91fc943f070281f6711edd1abe