![](/screenshots/458ba350-9acb-4f18-8a4e-191a317ec428.png)
seemly-bolder-fireplant.glitch.me
Open in
urlscan Pro
34.195.35.45
Malicious Activity!
Public Scan
Submission: On April 14 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time seemly-bolder-fireplant.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Santander (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 34.195.35.45 34.195.35.45 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 195.80.159.133 195.80.159.133 | 29152 (DECKNET-AS) (DECKNET-AS) | |
1 | 104.17.25.14 104.17.25.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-195-35-45.compute-1.amazonaws.com
seemly-bolder-fireplant.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 239 |
6 KB |
1 |
l2.io
l2.io — Cisco Umbrella Rank: 182514 |
226 B |
1 |
glitch.me
seemly-bolder-fireplant.glitch.me |
845 KB |
4 | 3 |
Domain | Requested by | |
---|---|---|
1 | cdnjs.cloudflare.com |
seemly-bolder-fireplant.glitch.me
|
1 | l2.io |
seemly-bolder-fireplant.glitch.me
|
1 | seemly-bolder-fireplant.glitch.me | |
4 | 3 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.santander.co.uk |
retail.santander.co.uk |
business.santander.co.uk |
corporate.santander.co.uk |
onetrust.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
l2.io R3 |
2024-03-05 - 2024-06-03 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-07-03 - 2024-07-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://seemly-bolder-fireplant.glitch.me/public/zano.html
Frame ID: D4944FF596ECFEB78584EB3DAF899C86
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/458ba350-9acb-4f18-8a4e-191a317ec428.png)
Page Title
Personal Online Banking: Log on or sign upDetected technologies
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
12 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Sign up
Search URL Search Domain Scan URL
Title: Business
Search URL Search Domain Scan URL
Title: Corporate
Search URL Search Domain Scan URL
Title: Forgotten details?
Search URL Search Domain Scan URL
Title: fraud and security
Search URL Search Domain Scan URL
Title: Online Banking Guarantee
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Title: Security & Privacy
Search URL Search Domain Scan URL
Title: Terms & Conditions
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: View Privacy Notice
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
zano.html
seemly-bolder-fireplant.glitch.me/public/ |
844 KB 845 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ip.js
l2.io/ |
22 B 226 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
138 KB 138 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
138 KB 138 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
77 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Santander (Banking)4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| savepage_ShadowLoader string| userip function| isNumber0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
6 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
l2.io
seemly-bolder-fireplant.glitch.me
104.17.25.14
195.80.159.133
34.195.35.45
08f86c6496d80636195dd2e2037f5c141f65ed6b969514531e61512ea239c5d8
1bca034dc76dab33232d41f7f9705fced08c4b48c90e23bd737e4b610d1b6df8
3c34b516dc489a5ff3cb121a73b6cfc25ec0920394b2d3b742d30201e71e6e24
4f51b60d2b5fa166c7da581743b7de958d1139de60d65af5a0b627a51bb3ce0a
779aada7e0e32c82f38045402b3a66a248602f8f67a382236c4529a60a340f17
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
cf2166ed0037c6f2797c0774063ecc0275cd08473aeff74cf79dc510bb60398b
f015bef1be25452dbec6c07a0608534230b0e69d99401f0a332c278c2235f6bf
f700c3638638b62b07e614c8cae5665cf4bfa956452ab4e6fea5a15965fc40f7