![](/screenshots/4197e272-43ed-4344-bb91-7963fe0b6600.png)
pedantic-mcclintock-c167c2.netlify.app
Open in
urlscan Pro
2a03:b0c0:3:d0::d23:e001
Malicious Activity!
Public Scan
Effective URL: https://pedantic-mcclintock-c167c2.netlify.app/n.htm
Submission: On July 22 via api from AU
Summary
TLS certificate: Issued by DigiCert TLS Hybrid ECC SHA384 2020 CA1 on March 9th 2021. Valid for: a year.
This is the only time pedantic-mcclintock-c167c2.netlify.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Sharepoint (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 107.23.110.216 107.23.110.216 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2a03:b0c0:3:d... 2a03:b0c0:3:d0::d23:e001 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
6 12 | 2620:100:6022... 2620:100:6022:15::a27d:420f | 19679 (DROPBOX) (DROPBOX) | |
1 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 78.129.237.3 78.129.237.3 | 20860 (IOMART-AS) (IOMART-AS) | |
10 | 6 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-107-23-110-216.compute-1.amazonaws.com
ajar-lizard-pasta.glitch.me |
ASN14061 (DIGITALOCEAN-ASN, US)
pedantic-mcclintock-c167c2.netlify.app |
ASN19679 (DROPBOX, US)
dl.dropbox.com | |
dl.dropboxusercontent.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
dropboxusercontent.com
dl.dropboxusercontent.com |
80 KB |
6 |
dropbox.com
6 redirects
dl.dropbox.com |
831 B |
1 |
smtpjs.com
smtpjs.com |
782 B |
1 |
googleapis.com
ajax.googleapis.com |
31 KB |
1 |
netlify.app
pedantic-mcclintock-c167c2.netlify.app |
1 KB |
1 |
glitch.me
ajar-lizard-pasta.glitch.me |
776 B |
10 | 6 |
Domain | Requested by | |
---|---|---|
6 | dl.dropboxusercontent.com |
pedantic-mcclintock-c167c2.netlify.app
|
6 | dl.dropbox.com | 6 redirects |
1 | smtpjs.com |
pedantic-mcclintock-c167c2.netlify.app
|
1 | ajax.googleapis.com |
pedantic-mcclintock-c167c2.netlify.app
|
1 | pedantic-mcclintock-c167c2.netlify.app |
ajar-lizard-pasta.glitch.me
|
1 | ajar-lizard-pasta.glitch.me | |
10 | 6 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.premierpawn.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2021-01-18 - 2022-02-15 |
a year | crt.sh |
*.netlify.app DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2021-03-09 - 2022-03-01 |
a year | crt.sh |
*.dl.dropboxusercontent.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-01-19 - 2022-02-14 |
a year | crt.sh |
upload.video.google.com GTS CA 1O1 |
2021-06-22 - 2021-09-14 |
3 months | crt.sh |
smtpjs.com R3 |
2021-07-09 - 2021-10-07 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pedantic-mcclintock-c167c2.netlify.app/n.htm
Frame ID: E0740409E125A8D7F3CB0211C114041E
Requests: 12 HTTP requests in this frame
Screenshot
![](/screenshots/4197e272-43ed-4344-bb91-7963fe0b6600.png)
Page URL History Show full URLs
- https://ajar-lizard-pasta.glitch.me/ Page URL
- https://pedantic-mcclintock-c167c2.netlify.app/n.htm Page URL
Page Statistics
2 Outgoing links
These are links going to different origins than the main page.
Title: SharePoint
Search URL Search Domain Scan URL
Title: DOC Q0017 - 3512C.Doc
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://ajar-lizard-pasta.glitch.me/ Page URL
- https://pedantic-mcclintock-c167c2.netlify.app/n.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://dl.dropbox.com/s/71mbw0ziz24stew/myscr584876.js?dl=0 HTTP 302
- https://dl.dropboxusercontent.com/s/71mbw0ziz24stew/myscr584876.js?dl=0
- https://dl.dropbox.com/s/45uascggf6klqxg/myscr262639.js?dl=0 HTTP 302
- https://dl.dropboxusercontent.com/s/45uascggf6klqxg/myscr262639.js?dl=0
- https://dl.dropbox.com/s/iri3h6e40giwbgp/myscr408434.js?dl=0 HTTP 302
- https://dl.dropboxusercontent.com/s/iri3h6e40giwbgp/myscr408434.js?dl=0
- https://dl.dropbox.com/s/q3i9j9uulpdw0ex/myscr294914.js?dl=0 HTTP 302
- https://dl.dropboxusercontent.com/s/q3i9j9uulpdw0ex/myscr294914.js?dl=0
- https://dl.dropbox.com/s/edj6r87l0s18yj9/myscr741586.js?dl=0 HTTP 302
- https://dl.dropboxusercontent.com/s/edj6r87l0s18yj9/myscr741586.js?dl=0
- https://dl.dropbox.com/s/jn3d0nvz733l8xx/myscr660617.js?dl=0 HTTP 302
- https://dl.dropboxusercontent.com/s/jn3d0nvz733l8xx/myscr660617.js?dl=0
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
ajar-lizard-pasta.glitch.me/ |
440 B 776 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
n.htm
pedantic-mcclintock-c167c2.netlify.app/ |
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr584876.js
dl.dropboxusercontent.com/s/71mbw0ziz24stew/ Redirect Chain
|
20 KB 8 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr262639.js
dl.dropboxusercontent.com/s/45uascggf6klqxg/ Redirect Chain
|
76 KB 29 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr408434.js
dl.dropboxusercontent.com/s/iri3h6e40giwbgp/ Redirect Chain
|
106 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr294914.js
dl.dropboxusercontent.com/s/q3i9j9uulpdw0ex/ Redirect Chain
|
1 KB 726 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr741586.js
dl.dropboxusercontent.com/s/edj6r87l0s18yj9/ Redirect Chain
|
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smtp.js
smtpjs.com/v3/ |
871 B 782 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
myscr660617.js
dl.dropboxusercontent.com/s/jn3d0nvz733l8xx/ Redirect Chain
|
3 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Sharepoint (Online)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| erp string| em number| tmp function| myFunction function| $ function| jQuery object| Email function| sendEmail0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajar-lizard-pasta.glitch.me
ajax.googleapis.com
dl.dropbox.com
dl.dropboxusercontent.com
pedantic-mcclintock-c167c2.netlify.app
smtpjs.com
107.23.110.216
2620:100:6022:15::a27d:420f
2a00:1450:4001:809::200a
2a03:b0c0:3:d0::d23:e001
78.129.237.3
04dbf6a749c8b9fa023675a2973649ac535d8efb9eff54219a66c03646bfa7f2
1fd711cb491a361ef91e29c50de0680a4b156c0b34bb91e18570d0037263a776
3be1aaa49873c8a579cbb323ed55f1576db39393ec4e97b186af64f1324afb43
5757e602c5502496be5d7ec17d19cd1d97dc216497dfc6a7654f2b6396e546f4
7f672d39017602a1ef5b484477bb7743904515691c3a0242993934d1dd833ece
85f15ad877a5aa9b57a6321e48745daf51831fafe863a348368a5c8602d21b1b
9509a2c3a742a1d27f583a11c451733c52f7b3299cb1e060735846761242e59f
975e8d22f5dbd1b005fd7af747a12e96f46876b89ccd9e5b2e2262155b77e6db
9ca01512df62c5bc30333666b9d54dd22450230f8acb04adfa426f9fe49aecd2
e123a412a12285e2cb13affa0949db3319768ddccd705a11efcad505fbc162a9
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
fa7c98bfaa958b620dc26b384d63a828db6309c5b60a864eb9cde28a2b84f741