polite-occipital-indigo.glitch.me
Open in
urlscan Pro
34.231.129.212
Malicious Activity!
Public Scan
Submission: On November 30 via automatic, source phishtank
Summary
TLS certificate: Issued by Amazon on February 18th 2020. Valid for: a year.
This is the only time polite-occipital-indigo.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 34.231.129.212 34.231.129.212 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 184.73.247.141 184.73.247.141 | 14618 (AMAZON-AES) (AMAZON-AES) | |
11 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-231-129-212.compute-1.amazonaws.com
polite-occipital-indigo.glitch.me |
ASN14618 (AMAZON-AES, US)
PTR: ec2-184-73-247-141.compute-1.amazonaws.com
api.ipify.org |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
glitch.me
polite-occipital-indigo.glitch.me |
246 KB |
1 |
ipify.org
api.ipify.org |
273 B |
1 |
jquery.com
code.jquery.com |
30 KB |
11 | 3 |
Domain | Requested by | |
---|---|---|
9 | polite-occipital-indigo.glitch.me |
polite-occipital-indigo.glitch.me
|
1 | api.ipify.org |
code.jquery.com
|
1 | code.jquery.com |
polite-occipital-indigo.glitch.me
|
11 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2020-02-18 - 2021-03-18 |
a year | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.ipify.org COMODO RSA Domain Validation Secure Server CA |
2018-01-24 - 2021-01-23 |
3 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://polite-occipital-indigo.glitch.me/
Frame ID: BF592EBF616A61A1BC9D1B03CA0AF96B
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers server /^AmazonS3$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
polite-occipital-indigo.glitch.me/ |
245 KB 246 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_Rg.woff2
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_CdLt.woff2
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_Bd.woff2
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_CdBlk.woff2
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
api.ipify.org/ |
23 B 273 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_CdLt.woff
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_CdBlk.woff
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_Bd.woff
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Delivery_W_Rg.woff
polite-occipital-indigo.glitch.me/css/fonts/delivery/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery string| currentBrowser string| OSName0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.ipify.org
code.jquery.com
polite-occipital-indigo.glitch.me
184.73.247.141
2001:4de0:ac19::1:b:3a
34.231.129.212
13bf462519d3748be67c4f4f8a4aa6ea0c7935a65e6607f0886d3a19a87b2f90
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
55de7fa1d7d120cab791bbbeadf10fe0f15783b296aceee56dc72c80896e4114
593618d973776f0cd4c6047898f4448ec35f2ab616a7bb2001dd10681cb36bbc
ac1d764c6cc0917360738530bdeb1f269648b5ba155624c52e243ce0d6ff4096
cbed74d96a71bf95ec3a3a824f0ddd43f1f100a751b2266e7c5a4b657ce39408
d6683412de237db4a88db3125dc8d6f59236e7792719a7e1a1dc637e1efd06e0