www.comzlbank.com
Open in
urlscan Pro
172.67.199.207
Malicious Activity!
Public Scan
Submission: On July 10 via manual from PT — Scanned from PT
Summary
TLS certificate: Issued by GTS CA 1P5 on July 10th 2023. Valid for: 3 months.
This is the only time www.comzlbank.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Commonwealth Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 172.67.199.207 172.67.199.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.21.21.188 104.21.21.188 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
10 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
comzlbank.com
www.comzlbank.com service.comzlbank.com |
416 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
8 | www.comzlbank.com |
www.comzlbank.com
|
2 | service.comzlbank.com |
www.comzlbank.com
|
10 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.comzlbank.com GTS CA 1P5 |
2023-07-10 - 2023-10-08 |
3 months | crt.sh |
comzlbank.com GTS CA 1P5 |
2023-07-10 - 2023-10-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.comzlbank.com/
Frame ID: 630F9A9957140011EB3F60B6B8E7CD4A
Requests: 12 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.comzlbank.com/ |
670 B 879 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.78accb2e.js
www.comzlbank.com/js/ |
1003 KB 303 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.6a81c319.js
www.comzlbank.com/js/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.ce885275.css
www.comzlbank.com/css/ |
371 KB 76 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.eea40dc2.css
www.comzlbank.com/css/ |
141 B 404 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
submit
service.comzlbank.com/api/visit/ |
0 0 |
Preflight
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
submit
service.comzlbank.com/api/visit/ |
38 B 370 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
85.67c7c74f.css
www.comzlbank.com/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
85.9e0307ff.js
www.comzlbank.com/js/ |
21 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
NB-Login-SmartMini.2fe75ea7.jpg
www.comzlbank.com/img/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Commonwealth Bank (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend object| webpackChunkauth_aib_ie object| __VUE_INSTANCE_SETTERS__ object| __vueuse_ssr_handlers__ boolean| __VUE__0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
service.comzlbank.com
www.comzlbank.com
104.21.21.188
172.67.199.207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