forested-cumbersome-tarsal.glitch.me
Open in
urlscan Pro
52.5.22.88
Malicious Activity!
Public Scan
Submission: On May 28 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time forested-cumbersome-tarsal.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: 1&1 Ionos (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 52.5.22.88 52.5.22.88 | 14618 (AMAZON-AES) (AMAZON-AES) | |
5 | 213.165.66.58 213.165.66.58 | 8560 (IONOS-AS ...) (IONOS-AS This is the joint network for IONOS) | |
1 1 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 2 | 192.229.233.123 192.229.233.123 | 15133 (EDGECAST) (EDGECAST) | |
1 1 | 13.32.121.15 13.32.121.15 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 18.66.97.45 18.66.97.45 | 16509 (AMAZON-02) (AMAZON-02) | |
10 | 5 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-5-22-88.compute-1.amazonaws.com
forested-cumbersome-tarsal.glitch.me |
ASN8560 (IONOS-AS This is the joint network for IONOS, Fasthosts, Arsys, 1&1 Mail and Media and 1&1 Telecom. Formerly known as 1&1 Internet SE., DE)
PTR: ce1.uicdn.net
ce1.uicdn.net |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-121-15.fra60.r.cloudfront.net
cdn.glitch.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-66-97-45.fra56.r.cloudfront.net
cdn.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
uicdn.net
ce1.uicdn.net — Cisco Umbrella Rank: 158552 |
258 KB |
4 |
glitch.me
forested-cumbersome-tarsal.glitch.me cdn.glitch.me — Cisco Umbrella Rank: 95958 |
564 KB |
2 |
typenetwork.com
1 redirects
cloud.typenetwork.com — Cisco Umbrella Rank: 22674 |
1 KB |
1 |
glitch.com
1 redirects
cdn.glitch.com — Cisco Umbrella Rank: 108124 |
461 B |
1 |
webtype.com
1 redirects
cloud.webtype.com — Cisco Umbrella Rank: 47782 |
583 B |
10 | 5 |
Domain | Requested by | |
---|---|---|
5 | ce1.uicdn.net |
forested-cumbersome-tarsal.glitch.me
|
3 | forested-cumbersome-tarsal.glitch.me |
forested-cumbersome-tarsal.glitch.me
|
2 | cloud.typenetwork.com |
1 redirects
forested-cumbersome-tarsal.glitch.me
|
1 | cdn.glitch.me |
forested-cumbersome-tarsal.glitch.me
|
1 | cdn.glitch.com | 1 redirects |
1 | cloud.webtype.com | 1 redirects |
10 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.ionos.com |
ias.ionos.com |
my.ionos.com |
hidrive.ionos.com |
archive.ionos.com |
www.ionos-status.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2022-02-01 - 2023-03-02 |
a year | crt.sh |
ce1.uicdn.net GeoTrust RSA CA 2018 |
2022-03-01 - 2023-03-10 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://forested-cumbersome-tarsal.glitch.me/?email=redacted@abuse.ionos.com
Frame ID: 8181D38C88CF270F370EF47C4AD21B86
Requests: 8 HTTP requests in this frame
Frame:
https://forested-cumbersome-tarsal.glitch.me/robots.txt
Frame ID: CA3077EF8C7D4D079D7743BB419CAB53
Requests: 3 HTTP requests in this frame
16 Outgoing links
These are links going to different origins than the main page.
Title: Webmail
Search URL Search Domain Scan URL
Title: Forgot your password?
Search URL Search Domain Scan URL
Title: Remember me
Search URL Search Domain Scan URL
Title: Learn more
Search URL Search Domain Scan URL
Title: iOS
Search URL Search Domain Scan URL
Title: Android
Search URL Search Domain Scan URL
Title: Thunderbird
Search URL Search Domain Scan URL
Title: Outlook
Search URL Search Domain Scan URL
Title: Apple Mail
Search URL Search Domain Scan URL
Title: email programs (POP/IMAP)
Search URL Search Domain Scan URL
Title: My IONOS
Search URL Search Domain Scan URL
Title: HiDrive
Search URL Search Domain Scan URL
Title: Email archiving
Search URL Search Domain Scan URL
Title: All Systems Operational
Search URL Search Domain Scan URL
Title: 1&1 IONOS Inc. • 2022
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 8- https://cloud.webtype.com/css/3a8e55c6-b1f3-4659-99eb-125ae72bd084.css HTTP 301
- https://cloud.typenetwork.com/css/3a8e55c6-b1f3-4659-99eb-125ae72bd084.css HTTP 301
- https://cloud.typenetwork.com/projects/5027/fontface.css/
- https://cdn.glitch.com/d7f4f279-e13b-4330-8422-00b2d9211424%2FGlitch-Error-Rainbow-Mug-hires.png?v=1595481653593 HTTP 301
- https://cdn.glitch.me/d7f4f279-e13b-4330-8422-00b2d9211424%2FGlitch-Error-Rainbow-Mug-hires.png
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
forested-cumbersome-tarsal.glitch.me/ |
20 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dane.css
forested-cumbersome-tarsal.glitch.me/ |
372 KB 372 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-regular.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 63 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
320 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
exos-icon-font.woff
ce1.uicdn.net/exos/icons/ |
49 KB 49 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-regular.woff
ce1.uicdn.net/exos/fonts/overpass/ |
42 KB 42 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
opensans-bold.woff
ce1.uicdn.net/exos/fonts/open-sans/ |
62 KB 62 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
overpass-bold.woff
ce1.uicdn.net/exos/fonts/overpass/ |
41 KB 41 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
robots.txt
forested-cumbersome-tarsal.glitch.me/ Frame CA30 |
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
cloud.typenetwork.com/projects/5027/fontface.css/ Frame CA30 Redirect Chain
|
889 B 790 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
d7f4f279-e13b-4330-8422-00b2d9211424%2FGlitch-Error-Rainbow-Mug-hires.png
cdn.glitch.me/ Frame CA30 Redirect Chain
|
166 KB 167 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: 1&1 Ionos (Telecommunication)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails object| navigation0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.glitch.com
cdn.glitch.me
ce1.uicdn.net
cloud.typenetwork.com
cloud.webtype.com
forested-cumbersome-tarsal.glitch.me
13.32.121.15
18.66.97.45
192.229.233.123
213.165.66.58
2a06:98c1:3120::3
52.5.22.88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