www.anzvnc.com
Open in
urlscan Pro
103.199.102.25
Malicious Activity!
Public Scan
Submission: On August 06 via manual from NZ — Scanned from NZ
Summary
TLS certificate: Issued by R10 on August 6th 2024. Valid for: 3 months.
This is the only time www.anzvnc.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: ANZ Bank (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
10 | 103.199.102.25 103.199.102.25 | 18013 (ASLINE-AS...) (ASLINE-AS-AP ASLINE LIMITED) | |
10 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
anzvnc.com
www.anzvnc.com |
491 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | www.anzvnc.com |
www.anzvnc.com
|
10 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.anzvnc.com R10 |
2024-08-06 - 2024-11-04 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://www.anzvnc.com/
Frame ID: 2E71A86F01CD329D76BBBBE9B0513D1D
Requests: 10 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
www.anzvnc.com/ |
751 B 628 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.b3bbd808.js
www.anzvnc.com/frontend/js/ |
1004 KB 350 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.efbd733a.js
www.anzvnc.com/frontend/js/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
chunk-vendors.b1cc9c10.css
www.anzvnc.com/frontend/css/ |
375 KB 88 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.d0090613.css
www.anzvnc.com/frontend/css/ |
1 KB 847 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
submit
www.anzvnc.com/api/visit/ |
40 B 334 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
anz-logo.1.0.0.ca35eb2d.svg
www.anzvnc.com/frontend/img/ |
38 KB 29 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
999.ab1ac6d0.css
www.anzvnc.com/frontend/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
999.0f867502.js
www.anzvnc.com/frontend/js/ |
6 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
www.anzvnc.com/frontend/ |
15 KB 15 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: ANZ Bank (Banking)3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| webpackChunkanz_bank object| __vueuse_ssr_handlers__ boolean| __VUE__1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.anzvnc.com/ | Name: XSRF-TOKEN Value: e203cb81560b47329475280c701ceb85d9fea9155fd375ed65beddaccf474412 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
www.anzvnc.com
103.199.102.25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