nowandzenlodi.com Open in urlscan Pro
173.247.242.103  Malicious Activity! Public Scan

URL: https://nowandzenlodi.com/word/processed/
Submission: On March 05 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 4 HTTP transactions. The main IP is 173.247.242.103, located in Santa Monica, United States and belongs to IMH-WEST, US. The main domain is nowandzenlodi.com.
TLS certificate: Issued by Let's Encrypt Authority X3 on February 27th 2020. Valid for: 3 months.
This is the only time nowandzenlodi.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
4 173.247.242.103 22611 (IMH-WEST)
4 1
Apex Domain
Subdomains
Transfer
4 nowandzenlodi.com
nowandzenlodi.com
306 KB
4 1
Domain Requested by
4 nowandzenlodi.com nowandzenlodi.com
4 1

This site contains no links.

Subject Issuer Validity Valid
nowandzenlodi.com
Let's Encrypt Authority X3
2020-02-27 -
2020-05-27
3 months crt.sh

This page contains 1 frames:

Primary Page: https://nowandzenlodi.com/word/processed/
Frame ID: A7281FDD7741C9EBA9F5BCCF6FBBF219
Requests: 4 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i

Page Statistics

4
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

306 kB
Transfer

305 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
nowandzenlodi.com/word/processed/
2 KB
1019 B
Document
General
Full URL
https://nowandzenlodi.com/word/processed/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
173.247.242.103 Santa Monica, United States, ASN22611 (IMH-WEST, US),
Reverse DNS
server.powersite-host.com
Software
Apache /
Resource Hash
2c9a9e70f9f6e21447695d4d67353165cb669bf6dcfa284bb0e5e6fc3ebb886c

Request headers

:method
GET
:authority
nowandzenlodi.com
:scheme
https
:path
/word/processed/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
sec-fetch-dest
document
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
document

Response headers

status
200
date
Thu, 05 Mar 2020 18:57:01 GMT
server
Apache
last-modified
Sun, 02 Feb 2020 18:16:22 GMT
accept-ranges
bytes
vary
Accept-Encoding
content-encoding
gzip
content-length
903
content-type
text/html
splash.png
nowandzenlodi.com/word/processed/Sign%20in_files/
34 KB
35 KB
Image
General
Full URL
https://nowandzenlodi.com/word/processed/Sign%20in_files/splash.png
Requested by
Host: nowandzenlodi.com
URL: https://nowandzenlodi.com/word/processed/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
173.247.242.103 Santa Monica, United States, ASN22611 (IMH-WEST, US),
Reverse DNS
server.powersite-host.com
Software
Apache /
Resource Hash
6a715a8be75e7ebf1f613041ee98db4ea37d696bcbc89f131f0081c55b96e8c0

Request headers

Referer
https://nowandzenlodi.com/word/processed/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 05 Mar 2020 18:57:01 GMT
last-modified
Thu, 20 Feb 2020 23:10:48 GMT
server
Apache
accept-ranges
bytes
content-length
35325
content-type
image/png
newenter.png
nowandzenlodi.com/word/processed/Sign%20in_files/
3 KB
4 KB
Image
General
Full URL
https://nowandzenlodi.com/word/processed/Sign%20in_files/newenter.png
Requested by
Host: nowandzenlodi.com
URL: https://nowandzenlodi.com/word/processed/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
173.247.242.103 Santa Monica, United States, ASN22611 (IMH-WEST, US),
Reverse DNS
server.powersite-host.com
Software
Apache /
Resource Hash
f3ffa63a8c40618e79794bb3b7ed116bebc1bcb3964f15c7f8ea3a1829cb5cc0

Request headers

Referer
https://nowandzenlodi.com/word/processed/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 05 Mar 2020 18:57:01 GMT
last-modified
Thu, 20 Feb 2020 23:11:45 GMT
server
Apache
accept-ranges
bytes
content-length
3575
content-type
image/png
background.png
nowandzenlodi.com/word/processed/Sign%20in_files/
265 KB
267 KB
Image
General
Full URL
https://nowandzenlodi.com/word/processed/Sign%20in_files/background.png
Requested by
Host: nowandzenlodi.com
URL: https://nowandzenlodi.com/word/processed/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
173.247.242.103 Santa Monica, United States, ASN22611 (IMH-WEST, US),
Reverse DNS
server.powersite-host.com
Software
Apache /
Resource Hash
ddb6b5706f83f5a11d4de018b5b1d40164ee2703f95e4ed6ba93a656f6b17edd

Request headers

Referer
https://nowandzenlodi.com/word/processed/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Dest
image

Response headers

status
200
date
Thu, 05 Mar 2020 18:57:01 GMT
last-modified
Mon, 16 Dec 2019 03:09:32 GMT
server
Apache
accept-ranges
bytes
content-length
271219
content-type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate function| unhideBody

0 Cookies