secure.anz.click
Open in
urlscan Pro
35.244.83.79
Malicious Activity!
Public Scan
Submission: On July 01 via automatic, source openphish
Summary
TLS certificate: Issued by R3 on June 30th 2021. Valid for: 3 months.
This is the only time secure.anz.click was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ANZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 35.244.83.79 35.244.83.79 | 15169 (GOOGLE) (GOOGLE) | |
1 | 202.2.56.161 202.2.56.161 | 9564 (ANZ-BANK-...) (ANZ-BANK-AP Australia and New Zealand Banking Group Limited) | |
8 | 2 |
ASN15169 (GOOGLE, US)
PTR: 79.83.244.35.bc.googleusercontent.com
secure.anz.click |
ASN9564 (ANZ-BANK-AP Australia and New Zealand Banking Group Limited, AU)
www.recovery.anz.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
anz.click
secure.anz.click |
183 KB |
1 |
anz.com
www.recovery.anz.com |
38 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
7 | secure.anz.click |
secure.anz.click
|
1 | www.recovery.anz.com |
secure.anz.click
|
8 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
secure.anz.click R3 |
2021-06-30 - 2021-09-28 |
3 months | crt.sh |
recovery.anz.com DigiCert SHA2 Secure Server CA |
2020-02-25 - 2022-02-28 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://secure.anz.click/recover/recover.html
Frame ID: 92382D5598ECECFD0665C9DC7A54E8A6
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
recover.html
secure.anz.click/recover/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
secure.anz.click/recover/ |
136 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-anz.svg
www.recovery.anz.com/recover/assets/ |
38 KB 38 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
19d63e6239c69c0f44839bda2b14f3a3.woff
secure.anz.click/recover/ |
51 KB 52 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b8d3788f91c669a1925bd89496e7f5c0.woff
secure.anz.click/recover/ |
51 KB 51 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
card-icon-large-screen.svg
secure.anz.click/recover/assets/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
phone-icon-large-screen.svg
secure.anz.click/recover/assets/ |
3 KB 3 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
b1b91c2bf9ce25b5a07df78739428781.woff
secure.anz.click/recover/ |
52 KB 52 KB |
Font
font/woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ANZ Bank (Banking)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
secure.anz.click
www.recovery.anz.com
202.2.56.161
35.244.83.79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