www.comzlbank.com
Open in
urlscan Pro
2606:4700:3032::6815:15bc
Malicious Activity!
Public Scan
Submission: On July 10 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on July 10th 2023. Valid for: 3 months.
This is the only time www.comzlbank.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Cloudflare (Online) Commonwealth Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 12 | 2606:4700:303... 2606:4700:3032::6815:15bc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3034::ac43:c7cf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
13 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
comzlbank.com
1 redirects
www.comzlbank.com service.comzlbank.com |
424 KB |
13 | 1 |
Domain | Requested by | |
---|---|---|
12 | www.comzlbank.com |
1 redirects
www.comzlbank.com
|
2 | service.comzlbank.com |
www.comzlbank.com
|
13 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.comzlbank.com GTS CA 1P5 |
2023-07-10 - 2023-10-08 |
3 months | crt.sh |
comzlbank.com GTS CA 1P5 |
2023-07-10 - 2023-10-08 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.comzlbank.com/
Frame ID: 71FE9AE510ABF8D73FBD7452A42CFF7D
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
auth_aib_iePage URL History Show full URLs
- https://www.comzlbank.com/ Page URL
-
https://www.comzlbank.com/cdn-cgi/phish-bypass?atok=VRu9VxnsM3uFUt3ywZ5_VTnbXkG7WiZKIpqbtE6.axY-168899...
HTTP 301
https://www.comzlbank.com/ Page URL
Detected technologies
Vue.js (JavaScript Frameworks) ExpandDetected patterns
- <[^>]+\sdata-v(?:ue)?-
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.comzlbank.com/ Page URL
-
https://www.comzlbank.com/cdn-cgi/phish-bypass?atok=VRu9VxnsM3uFUt3ywZ5_VTnbXkG7WiZKIpqbtE6.axY-1688999594-0-%2F
HTTP 301
https://www.comzlbank.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
www.comzlbank.com/ |
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
cf.errors.css
www.comzlbank.com/cdn-cgi/styles/ |
24 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon-exclamation.png
www.comzlbank.com/cdn-cgi/images/ |
452 B 541 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
www.comzlbank.com/ Redirect Chain
|
670 B 751 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.78accb2e.js
www.comzlbank.com/js/ |
1003 KB 303 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.6a81c319.js
www.comzlbank.com/js/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.ce885275.css
www.comzlbank.com/css/ |
371 KB 76 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.eea40dc2.css
www.comzlbank.com/css/ |
141 B 464 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
submit
service.comzlbank.com/api/visit/ |
0 0 |
Preflight
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
submit
service.comzlbank.com/api/visit/ |
38 B 384 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
85.67c7c74f.css
www.comzlbank.com/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
85.9e0307ff.js
www.comzlbank.com/js/ |
21 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
NB-Login-SmartMini.2fe75ea7.jpg
www.comzlbank.com/img/ |
17 KB 17 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Cloudflare (Online) Commonwealth Bank (Banking)7 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| onbeforetoggle object| onscrollend object| webpackChunkauth_aib_ie object| __VUE_INSTANCE_SETTERS__ object| __vueuse_ssr_handlers__ boolean| __VUE__1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.www.comzlbank.com/ | Name: __cf_mw_byp Value: VRu9VxnsM3uFUt3ywZ5_VTnbXkG7WiZKIpqbtE6.axY-1688999594-0-/ |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
service.comzlbank.com
www.comzlbank.com
2606:4700:3032::6815:15bc
2606:4700:3034::ac43:c7cf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