Submitted URL: http://auth-grooby.smartlink.mk/ 9mo old
Effective URL: https://auth-grooby.smartlink.mk/ 9mo old
Submission Tags: @ecarlesi possiblethreat Search All
Submission: On July 21 via api from IT — Scanned from IT

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 13.32.99.14, located in United States and belongs to AMAZON-02, US. The main domain is auth-grooby.smartlink.mk. 9mo old
TLS certificate: Issued by Amazon RSA 2048 M04 on July 20th 2025. Valid for: 1yr.
This is the only time auth-grooby.smartlink.mk was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 13.32.99.14 16509 (AMAZON-02)
1 2
Apex Domain
Subdomains
Transfer
1 smartlink.mk
auth-grooby.smartlink.mk 9mo old
1 1
Domain Requested by
1 auth-grooby.smartlink.mk
1 1

This site contains no links.

Subject Issuer Validity Valid
auth-grooby.smartlink.mk
Amazon RSA 2048 M04
2025-07-20 -
2026-08-18
1yr crt.sh

This page contains 1 frames:

Primary Page: https://auth-grooby.smartlink.mk/
Frame ID: F247783172E0D8C0A590BA4DF6BDE997
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

auth-grooby.smartlink.mk

Page URL History Show full URLs

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

0 kB
Transfer

8 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.


Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
auth-grooby.smartlink.mk/
Redirect Chain
  • http://auth-grooby.smartlink.mk/
  • https://auth-grooby.smartlink.mk/
0
0
Document
General
Full URL
https://auth-grooby.smartlink.mk/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
13.32.99.14 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-32-99-14.fra60.r.cloudfront.net
Software
awselb/2.0 /
Resource Hash

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36

Response headers

content-length
0
content-type
text/plain; charset=utf-8
date
Mon, 21 Jul 2025 00:23:20 GMT
server
awselb/2.0
via
1.1 231be1c97cc722fa08b64d21072ebfac.cloudfront.net (CloudFront)
x-amz-cf-id
A-rKR9ggfkEierQwwcnKhAIRxUFu97T_13Ohb8-VvmxIPLla4Sz2uQ==
x-amz-cf-pop
FRA60-P3
x-cache
Error from cloudfront

Redirect headers

Location
https://auth-grooby.smartlink.mk/
Non-Authoritative-Reason
HttpsUpgrades
truncated
/
3 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
155 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/138.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

64 JavaScript Window variables

These are the non-standard variables defined on the window object. These include var declarations and global functions and can be helpful in identifying possible client-side frameworks and code.

function| assert function| getRequiredElement function| P function| S function| getRandomNum function| getTimeStamp function| getRunnerImageSprite function| getRunnerAltGameImageSprite function| getRunnerAltCommonImageSprite function| getRunnerOrigImageSprite function| getRunnerSlowdown function| getRunnerAudioCues function| getRunnerSpriteDefinition function| getRunnerDefaultDimensions function| getRunnerConfigValue function| getRunnerGeneratedSoundFx object| Dimensions object| Config$2 function| getSpriteConfigForType function| getGlobalConfig function| setGlobalConfig object| Config$1 object| Config function| setMaxGapCoefficient function| setMaxObstacleLength object| Status function| Runner function| announcePhrase function| getA11yString function| vibrate function| createCanvas function| decodeBase64ToArrayBuffer function| checkForCollision function| createAdjustedCollisionBox function| boxCompare function| toggleHelpBox function| diagnoseErrors function| portalSignin function| updateForDnsProbe function| getMainFrameErrorCssClass function| getMainFrameErrorIconCssClass function| getSubFrameErrorIconCssClass function| shouldShowSuggestionsSummaryList function| getSuggestionsSummaryItemCssClass function| reloadButtonClick function| downloadButtonClick function| detailsButtonClick function| setAutoFetchState function| savePageLaterClick function| cancelSavePageClick function| shouldShowControlButtons function| shouldShowDetailsButton function| getDetailsButtonCssClass function| getDetailsButtonText function| getButtonsCssClass function| onDocumentLoad function| onTemplateDataReceived function| getHtml object| litPropertyMetadata object| reactiveElementVersions object| litHtmlVersions object| litElementVersions object| loadTimeDataRaw object| errorPageController

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: chrome-error://chromewebdata/
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

auth-grooby.smartlink.mk
13.32.99.14
04d05978fdb111358073ab0524e5c1fafc0826615c206987618416b8bd8a4747
7808605ddd1f0eaa454aa444293d2f0260943e51e53838fca46506e6a69fe521
e4222715b556e7d99622c83e620d2f8e090047e56adb07923047f95828d561f2