Submitted URL: https://b67z6.app.link/
Effective URL: https://lozada-aw.com/b2020r/
Submission: On January 30 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 2 domains to perform 3 HTTP transactions. The main IP is 192.185.77.222, located in Houston, United States and belongs to UNIFIEDLAYER-AS-1, US. The main domain is lozada-aw.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on December 24th 2019. Valid for: 3 months.
This is the only time lozada-aw.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Bank of America (Banking)

Domain & IP information

IP Address AS Autonomous System
1 1 2600:9000:205... 16509 (AMAZON-02)
1 1 2600:9000:214... 16509 (AMAZON-02)
1 1 2600:9000:205... 16509 (AMAZON-02)
3 192.185.77.222 46606 (UNIFIEDLA...)
3 1
Apex Domain
Subdomains
Transfer
3 lozada-aw.com
lozada-aw.com
73 KB
3 app.link
b67z6.app.link
wcglu-alternate.app.link
qohdp.app.link
2 KB
3 2
Domain Requested by
3 lozada-aw.com lozada-aw.com
1 qohdp.app.link 1 redirects
1 wcglu-alternate.app.link 1 redirects
1 b67z6.app.link 1 redirects
3 4

This site contains no links.

Subject Issuer Validity Valid
lozada-aw.com
Let's Encrypt Authority X3
2019-12-24 -
2020-03-23
3 months crt.sh

This page contains 1 frames:

Primary Page: https://lozada-aw.com/b2020r/
Frame ID: 475869A1868A21DEC94ADA46F37000CB
Requests: 3 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://b67z6.app.link/ HTTP 307
    https://wcglu-alternate.app.link/ HTTP 307
    https://qohdp.app.link/ HTTP 307
    https://lozada-aw.com/b2020r/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

3
Requests

100 %
HTTPS

75 %
IPv6

2
Domains

4
Subdomains

1
IPs

1
Countries

73 kB
Transfer

141 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://b67z6.app.link/ HTTP 307
    https://wcglu-alternate.app.link/ HTTP 307
    https://qohdp.app.link/ HTTP 307
    https://lozada-aw.com/b2020r/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
lozada-aw.com/b2020r/
Redirect Chain
  • https://b67z6.app.link/
  • https://wcglu-alternate.app.link/
  • https://qohdp.app.link/
  • https://lozada-aw.com/b2020r/
422 B
556 B
Document
General
Full URL
https://lozada-aw.com/b2020r/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.77.222 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-77-222.unifiedlayer.com
Software
Apache /
Resource Hash
77a0e782d0685df1644f5f442f52d6d78145e2ed374659fc2be331165984a17d

Request headers

:method
GET
:authority
lozada-aw.com
:scheme
https
:path
/b2020r/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
sec-fetch-user
?1
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
sec-fetch-site
none
sec-fetch-mode
navigate
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36
Sec-Fetch-User
?1

Response headers

status
200
date
Thu, 30 Jan 2020 23:52:23 GMT
server
Apache
expires
Thu, 19 Nov 1981 08:52:00 GMT
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
pragma
no-cache
set-cookie
cazanova=c8d0573920e42ea61da521567884225e91ba3375; expires=Fri, 31-Jan-2020 01:52:23 GMT; path=/; HttpOnly
vary
Accept-Encoding
content-encoding
gzip
content-length
294
content-type
text/html; charset=UTF-8

Redirect headers

Content-Length
0
Connection
keep-alive
Server
openresty/1.13.6.2
Date
Thu, 30 Jan 2020 23:52:22 GMT
X-Powered-By
Express
Set-Cookie
_s=8Jql4DdJUOsZF5FS%2BehsZ8AhNBTO7UAQvxa6Hvibc1B2lt7aRRxUicWONOD3BTpz; Max-Age=31536000; Domain=.app.link; Path=/; Expires=Fri, 29 Jan 2021 23:52:21 GMT; Secure; SameSite=None
Last-Modified
Thu, 30 Jan 2020 23:52:22 GMT
Location
https://lozada-aw.com/b2020r/
X-Cache
Miss from cloudfront
Via
1.1 2f0580a0593ad9d3fb82aee9226d8179.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA6-C1
X-Amz-Cf-Id
5tlvQ_vuR3rxpxlIkqMuSC6lYo_My69lbC8lEGlJ4_QSxXGovZwZmw==
captcha.js
lozada-aw.com/b2020r//assets/js/
123 KB
54 KB
Script
General
Full URL
https://lozada-aw.com/b2020r//assets/js/captcha.js
Requested by
Host: lozada-aw.com
URL: https://lozada-aw.com/b2020r/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.77.222 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-77-222.unifiedlayer.com
Software
Apache /
Resource Hash
abda937cf2741f8b08acc1fa946f155ee91073120f8de3dbcd26f70fc24f698b

Request headers

Referer
https://lozada-aw.com/b2020r/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

date
Thu, 30 Jan 2020 23:52:24 GMT
content-encoding
gzip
last-modified
Mon, 07 Oct 2019 22:02:48 GMT
server
Apache
vary
Accept-Encoding
content-type
application/javascript
status
200
accept-ranges
bytes
captcha.png
lozada-aw.com/b2020r//
17 KB
18 KB
Image
General
Full URL
https://lozada-aw.com/b2020r//captcha.png?_1580428346468
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
192.185.77.222 Houston, United States, ASN46606 (UNIFIEDLAYER-AS-1, US),
Reverse DNS
192-185-77-222.unifiedlayer.com
Software
Apache /
Resource Hash
48bbd41c897a16295d95376316f79a6f8085740f1d993480ccf6d873cbc7f3a6

Request headers

Referer
https://lozada-aw.com/b2020r/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_6) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/79.0.3945.88 Safari/537.36

Response headers

pragma
no-cache
date
Thu, 30 Jan 2020 23:52:26 GMT
content-encoding
gzip
server
Apache
vary
Accept-Encoding
content-type
image/png
status
200
cache-control
no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires
Thu, 19 Nov 1981 08:52:00 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Bank of America (Banking)

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| setImmediate function| clearImmediate function| Vue

1 Cookies

Domain/Path Name / Value
lozada-aw.com/ Name: cazanova
Value: c8d0573920e42ea61da521567884225e91ba3375