rzlenterprise.com Open in urlscan Pro
103.239.222.228  Malicious Activity! Public Scan

URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=
Submission: On June 23 via automatic, source openphish — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 103.239.222.228, located in Singapore and belongs to BASICBRIX-AS-AP BasicBrix LLP, SG. The main domain is rzlenterprise.com.
TLS certificate: Issued by R3 on June 19th 2022. Valid for: 3 months.
This is the only time rzlenterprise.com was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: America First Credit Union (Banking)

Domain & IP information

IP Address AS Autonomous System
2 103.239.222.228 64010 (BASICBRIX...)
1 2a00:1450:400... 15169 (GOOGLE)
3 3
Apex Domain
Subdomains
Transfer
2 rzlenterprise.com
rzlenterprise.com
2 MB
1 googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 307
33 KB
3 2
Domain Requested by
2 rzlenterprise.com rzlenterprise.com
1 ajax.googleapis.com rzlenterprise.com
3 2

This site contains links to these domains. Also see Links.

Domain
secure.americafirst.com
portal.hud.gov
www.ncua.gov
Subject Issuer Validity Valid
rzlenterprise.com
R3
2022-06-19 -
2022-09-17
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2022-06-06 -
2022-08-29
3 months crt.sh

This page contains 1 frames:

Primary Page: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=
Frame ID: 8CB93CCA53430CF75AE7B0A8B3E2E652
Requests: 8 HTTP requests in this frame

Screenshot

Page Title

America First Credit Union

Detected technologies

Overall confidence: 100%
Detected patterns
  • \.php(?:$|\?)

Overall confidence: 100%
Detected patterns
  • /([\d.]+)/jquery(?:\.min)?\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

3
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

1946 kB
Transfer

2024 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login.php
rzlenterprise.com/AmericaFCU3/
65 KB
66 KB
Document
General
Full URL
https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
103.239.222.228 , Singapore, ASN64010 (BASICBRIX-AS-AP BasicBrix LLP, SG),
Reverse DNS
web228.cloudwebnet.com
Software
Apache /
Resource Hash
8de61c81ad6f217345964de9cdfc4beb08c2c6c1bdcd43c2f3da9ba47ca6a4b4

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
Keep-Alive
Content-Type
text/html; charset=UTF-8
Date
Thu, 23 Jun 2022 01:30:23 GMT
Keep-Alive
timeout=5, max=100
Server
Apache
Transfer-Encoding
chunked
style.css
rzlenterprise.com/AmericaFCU3/css/
2 MB
2 MB
Stylesheet
General
Full URL
https://rzlenterprise.com/AmericaFCU3/css/style.css
Requested by
Host: rzlenterprise.com
URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
103.239.222.228 , Singapore, ASN64010 (BASICBRIX-AS-AP BasicBrix LLP, SG),
Reverse DNS
web228.cloudwebnet.com
Software
Apache /
Resource Hash
fcd30a9b7f099f3298e49f196d166054db82f5a60e504006536f1e08dd703d8c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Date
Thu, 23 Jun 2022 01:30:23 GMT
Last-Modified
Sun, 20 Feb 2022 17:12:12 GMT
Server
Apache
Content-Type
text/css
Connection
Keep-Alive
Accept-Ranges
bytes
Keep-Alive
timeout=5, max=100
Content-Length
1891967
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/1.9.1/
90 KB
33 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/1.9.1/jquery.min.js
Requested by
Host: rzlenterprise.com
URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:803::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
c12f6098e641aaca96c60215800f18f5671039aecf812217fab3c0d152f6adb4
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://rzlenterprise.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

date
Wed, 22 Jun 2022 21:28:23 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
14521
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/hosted-libraries-pushers
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000,h3-Q050=":443"; ma=2592000,h3-Q046=":443"; ma=2592000,h3-Q043=":443"; ma=2592000,quic=":443"; ma=2592000; v="46,43"
content-length
33018
x-xss-protection
0
last-modified
Tue, 03 Mar 2020 19:15:00 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="hosted-libraries-pushers"
vary
Accept-Encoding
report-to
{"group":"hosted-libraries-pushers","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/hosted-libraries-pushers"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Thu, 22 Jun 2023 21:28:23 GMT
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
83b34f00b6612015c941c3865d2c047ae5ce567f13530491ac4ed773b13b1bd3

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
9 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c9a0078a7b8e70e1437317247095c89510a6c40bdb3bb37a26318133e2c1ab54

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a6690102b24638424202c679e3c3fafe83bdaa641e40dca06968bcad77f70821

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
df808b2ea829eac97e99d46d91fa6a005269d58a9dfd57ff40f7084e6f027f7b

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
986dae282bc4d35f7234bbf7c3eafd4b4bb990b89143be1f5c8a8aa4a04ee2b4

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.53 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: America First Credit Union (Banking)

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| savepage_ShadowLoader function| $ function| jQuery function| showOne function| showTwo

0 Cookies

4 Console Messages

Source Level URL
Text
other warning URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=(Line 1)
Message:
<link rel=preload> has an invalid `href` value
other warning URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=(Line 1)
Message:
<link rel=preload> has an invalid `href` value
other warning URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=(Line 1)
Message:
<link rel=preload> has an invalid `href` value
other warning URL: https://rzlenterprise.com/AmericaFCU3/login.php?online_id=9a91ff7a9009267b2628d0f49&country=&iso=(Line 1)
Message:
<link rel=preload> has an invalid `href` value