lloydsbankapp.com
Open in
urlscan Pro
37.46.150.38
Malicious Activity!
Public Scan
Effective URL: https://lloydsbankapp.com/Login?session=s2839j4sdf34544dftyry75463435dqr&secure=true&time=24872749843
Submission: On December 07 via api from GB
Summary
TLS certificate: Issued by R3 on December 4th 2020. Valid for: 3 months.
This is the only time lloydsbankapp.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Lloyds (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 9 | 37.46.150.38 37.46.150.38 | 213035 (SERVERION...) (SERVERION-AS Serverion B.V.) | |
1 | 2a00:1450:400... 2a00:1450:4001:820::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2a00:1450:400... 2a00:1450:4001:819::2003 | 15169 (GOOGLE) (GOOGLE) | |
9 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
lloydsbankapp.com
2 redirects
lloydsbankapp.com |
122 KB |
1 |
gstatic.com
fonts.gstatic.com |
15 KB |
1 |
googleapis.com
fonts.googleapis.com |
660 B |
9 | 3 |
Domain | Requested by | |
---|---|---|
9 | lloydsbankapp.com |
2 redirects
lloydsbankapp.com
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
lloydsbankapp.com
|
9 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
online.lloydsbank.co.uk |
www.online.lloydsbank.co.uk |
www.lloydsbank.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
lloydsbankapp.com R3 |
2020-12-04 - 2021-03-04 |
3 months | crt.sh |
upload.video.google.com GTS CA 1O1 |
2020-11-03 - 2021-01-26 |
3 months | crt.sh |
*.gstatic.com GTS CA 1O1 |
2020-11-03 - 2021-01-26 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://lloydsbankapp.com/Login?session=s2839j4sdf34544dftyry75463435dqr&secure=true&time=24872749843
Frame ID: BC0E8DF29BE9321CB70D8C59D611BD35
Requests: 9 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://lloydsbankapp.com/
HTTP 301
https://lloydsbankapp.com/ HTTP 302
https://lloydsbankapp.com/Login?session=s2839j4sdf34544dftyry75463435dqr&secure=true&time=24872749843 Page URL
Detected technologies
Ubuntu (Operating Systems) ExpandDetected patterns
- headers server /Ubuntu/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Page Statistics
12 Outgoing links
These are links going to different origins than the main page.
Title: Cookie Policy
Search URL Search Domain Scan URL
Title: Having problems signing in?
Search URL Search Domain Scan URL
Title: Remember my User ID
Search URL Search Domain Scan URL
Title: Forgotten your logon details?
Search URL Search Domain Scan URL
Title:
Search URL Search Domain Scan URL
Title: Register for Internet Banking
Search URL Search Domain Scan URL
Title: Go to desktop site
Search URL Search Domain Scan URL
Title: Help
Search URL Search Domain Scan URL
Title: Security
Search URL Search Domain Scan URL
Title: Contact us
Search URL Search Domain Scan URL
Title: Mobile Banking
Search URL Search Domain Scan URL
Title: Legal
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://lloydsbankapp.com/
HTTP 301
https://lloydsbankapp.com/ HTTP 302
https://lloydsbankapp.com/Login?session=s2839j4sdf34544dftyry75463435dqr&secure=true&time=24872749843 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Login
lloydsbankapp.com/ Redirect Chain
|
14 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
base-auto-min200526.css
lloydsbankapp.com/files/css/ |
107 KB 18 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
2 KB 660 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
lloydsbankapp.com/files/js/ |
266 KB 77 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-.gif
lloydsbankapp.com/files/img/ |
2 KB 2 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
padlock-1429554491.png
lloydsbankapp.com/files/img/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
personalloan2020-.png
lloydsbankapp.com/files/img/ |
16 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
va9E4kDNxMZdWfMOD5Vvl4jLazX3dA.woff2
fonts.gstatic.com/s/firasans/v10/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
greenright.png
lloydsbankapp.com/files/img/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Lloyds (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| tealium_accept1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
lloydsbankapp.com/ | Name: PHPSESSID Value: ror9ellqkjs4h2pqnr8ikhechp |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
lloydsbankapp.com
2a00:1450:4001:819::2003
2a00:1450:4001:820::200a
37.46.150.38
1170fa4eb15d2cfc194eb6a0aa588eef91b2450774213ec571706334ec96f217
45ae8dbb34f1f79a4c94c5b8534179413ed42ec63ba1ab95ad9f09d3a30d0a82
77d5d1ce38956c7451558ce3d909445996eb6e3d532ad24b71a386d827d25947
84086bb634fc6fd223918894c6b74641811e06e84007937c5809942b7a02ddff
a8e9a3202b0ed16c5fe4ebd141ea40ccc2be1495aef3a079fa3707c52a7ac710
bb5ed49827fd7afb97ecda2e084464a84429e2402a1729fdd66a91e4b948f1e2
bc157ca646eb82318578cd7834dc2ac6c0ccb58020b98e9fede214b3d62ac646
bf180852272b140fe22e3074d69f646e14a0e38a2a14e176c2eefc1f34b987c0
c25407149a8c6d1fb034c5af2d3e00f2d39abc4766125ee810285a22a59f9489