www.anznznz.com
Open in
urlscan Pro
103.199.102.25
Malicious Activity!
Public Scan
Submission: On July 29 via api from NZ — Scanned from NZ
Summary
TLS certificate: Issued by R11 on July 28th 2024. Valid for: 3 months.
This is the only time www.anznznz.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ANZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 103.199.102.25 103.199.102.25 | 18013 (ASLINE-AS...) (ASLINE-AS-AP ASLINE LIMITED) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
anznznz.com
www.anznznz.com |
491 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.anznznz.com |
www.anznznz.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.anznznz.com R11 |
2024-07-28 - 2024-10-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.anznznz.com/
Frame ID: 662B1597E7D1EBC1C86A5F4C296B7CB1
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.anznznz.com/ |
751 B 710 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.b3bbd808.js
www.anznznz.com/frontend/js/ |
1004 KB 350 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.219a855a.js
www.anznznz.com/frontend/js/ |
7 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.b1cc9c10.css
www.anznznz.com/frontend/css/ |
375 KB 88 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.d0090613.css
www.anznznz.com/frontend/css/ |
1 KB 847 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
submit
www.anznznz.com/api/visit/ |
40 B 348 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
anz-logo.1.0.0.ca35eb2d.svg
www.anznznz.com/frontend/img/ |
38 KB 29 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
459.88a94f97.css
www.anznznz.com/frontend/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
459.70662f97.js
www.anznznz.com/frontend/js/ |
5 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.anznznz.com/frontend/ |
15 KB 15 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ANZ Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkanz_bank object| __vueuse_ssr_handlers__ boolean| __VUE__0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.anznznz.com
103.199.102.25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