airy-spectacular-eggplant.glitch.me Open in urlscan Pro
50.17.184.26  Malicious Activity! Public Scan

Submitted URL: http://a06e1a06e1.wondercakebd.com/
Effective URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Submission: On February 23 via manual from IT — Scanned from IT

Summary

This website contacted 6 IPs in 3 countries across 5 domains to perform 9 HTTP transactions. The main IP is 50.17.184.26, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is airy-spectacular-eggplant.glitch.me.
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time airy-spectacular-eggplant.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 139.59.245.33 14061 (DIGITALOC...)
1 50.17.184.26 14618 (AMAZON-AES)
4 152.199.23.37 15133 (EDGECAST)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
1 192.229.221.185 15133 (EDGECAST)
1 2620:1ec:bdf::44 8068 (MICROSOFT...)
9 6
Apex Domain
Subdomains
Transfer
4 msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 1245
52 KB
2 msauth.net
logincdn.msauth.net — Cisco Umbrella Rank: 2289
aadcdn.msauth.net — Cisco Umbrella Rank: 1225
3 KB
1 jquery.com
code.jquery.com — Cisco Umbrella Rank: 546
30 KB
1 glitch.me
airy-spectacular-eggplant.glitch.me
43 KB
1 wondercakebd.com
a06e1a06e1.wondercakebd.com
874 B
9 5
Domain Requested by
4 aadcdn.msftauth.net airy-spectacular-eggplant.glitch.me
1 aadcdn.msauth.net airy-spectacular-eggplant.glitch.me
1 logincdn.msauth.net airy-spectacular-eggplant.glitch.me
1 code.jquery.com airy-spectacular-eggplant.glitch.me
1 airy-spectacular-eggplant.glitch.me a06e1a06e1.wondercakebd.com
1 a06e1a06e1.wondercakebd.com
9 6

This site contains links to these domains. Also see Links.

Domain
passwordreset.microsoftonline.com
www.microsoft.com
privacy.microsoft.com
Subject Issuer Validity Valid
glitch.com
Amazon
2022-02-01 -
2023-03-02
a year crt.sh
aadcdn.msftauth.net
DigiCert SHA2 Secure Server CA
2021-05-13 -
2022-05-13
a year crt.sh
*.jquery.com
Sectigo RSA Domain Validation Secure Server CA
2021-07-14 -
2022-08-14
a year crt.sh
identitycdn.msauth.net
DigiCert SHA2 Secure Server CA
2021-05-13 -
2022-05-13
a year crt.sh
aadcdn.msauth.net
DigiCert SHA2 Secure Server CA
2022-02-22 -
2023-02-22
a year crt.sh

This page contains 1 frames:

Primary Page: https://airy-spectacular-eggplant.glitch.me/authtry.html
Frame ID: FA229C92DA9053DC92A5653A2D1DBF7B
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

Sign in to your account

Page URL History Show full URLs

  1. http://a06e1a06e1.wondercakebd.com/ Page URL
  2. https://airy-spectacular-eggplant.glitch.me/authtry.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery[.-]([\d.]*\d)[^/]*\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

9
Requests

89 %
HTTPS

33 %
IPv6

5
Domains

6
Subdomains

6
IPs

3
Countries

128 kB
Transfer

239 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://a06e1a06e1.wondercakebd.com/ Page URL
  2. https://airy-spectacular-eggplant.glitch.me/authtry.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
a06e1a06e1.wondercakebd.com/
632 B
874 B
Document
General
Full URL
http://a06e1a06e1.wondercakebd.com/
Protocol
HTTP/1.1
Server
139.59.245.33 Singapore, Singapore, ASN14061 (DIGITALOCEAN-ASN, US),
Reverse DNS
onzsolutions.com
Software
Apache /
Resource Hash
e770d7f56939c1cc9fac84ec67eac6784d459015b3b389582bee3ba2c523075f

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
it-IT,it;q=0.9

Response headers

Date
Wed, 23 Feb 2022 11:01:52 GMT
Server
Apache
Last-Modified
Mon, 21 Feb 2022 21:52:47 GMT
Accept-Ranges
bytes
Content-Length
632
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html
Primary Request authtry.html
airy-spectacular-eggplant.glitch.me/
43 KB
43 KB
Document
General
Full URL
https://airy-spectacular-eggplant.glitch.me/authtry.html
Requested by
Host: a06e1a06e1.wondercakebd.com
URL: http://a06e1a06e1.wondercakebd.com/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
50.17.184.26 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-50-17-184-26.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
a89fa033475850d3ac4d8294e10b7f8960e8d87b53d5af5e7fd05aaaa6a993f8

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36
Accept-Language
it-IT,it;q=0.9
Referer
http://a06e1a06e1.wondercakebd.com/

Response headers

date
Wed, 23 Feb 2022 11:01:52 GMT
content-type
text/html; charset=utf-8
content-length
43626
x-amz-id-2
szlJ/k/TwBY3DuByfyuqlDIgy/PYgyHT9ykin9Q4yefRrx1c/iyYhZ/TqUGgJ+ZHvzzwoIY+5Jw=
x-amz-request-id
YKWZ7NRH5SQ4YC2R
last-modified
Mon, 21 Feb 2022 22:02:26 GMT
etag
"8e8bdeb64ca8989716de4ef0a2e7b8b2"
cache-control
no-cache
x-amz-version-id
mhW4Ou_katarh0Cg7wcAty89A0iD4bL5
accept-ranges
bytes
server
AmazonS3
converged.v2.login.min_rayhgcterrtxpnvapp3erg2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/
105 KB
20 KB
Stylesheet
General
Full URL
https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_rayhgcterrtxpnvapp3erg2.css
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.23.37 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (mil/6C60) /
Resource Hash
ea6449d448a48495c557755af39701567925ceafc30e06fba05f65e723c91aa3

Request headers

Referer
https://airy-spectacular-eggplant.glitch.me/
Origin
https://airy-spectacular-eggplant.glitch.me
Accept-Language
it-IT,it;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
content-md5
+rPQJ6BWMovrMLNrlexvKQ==
age
19439557
x-cache
HIT
content-length
19595
x-ms-lease-status
unlocked
last-modified
Sat, 21 Nov 2020 03:49:00 GMT
server
ECAcc (mil/6C60)
etag
0x8D88DD061D3546B
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-ms-request-id
8f9284d2-901e-0002-32d7-77d3e8000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
accept-ranges
bytes
jquery-3.1.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.1.1.min.js
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac18::1:a:1b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
https://airy-spectacular-eggplant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
last-modified
Fri, 20 Aug 2021 17:47:53 GMT
server
nginx
etag
W/"611feac9-152b5"
vary
Accept-Encoding
x-hw
1645614112.dop201.ml1.t,1645614112.cds221.ml1.hn,1645614112.cds204.ml1.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30070
converged.v2.login.min_rayhgcterrtxpnvapp3erg2.css
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/
0
19 KB
Other
General
Full URL
https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/converged.v2.login.min_rayhgcterrtxpnvapp3erg2.css
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.23.37 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (mil/6C60) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
https://airy-spectacular-eggplant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
content-md5
+rPQJ6BWMovrMLNrlexvKQ==
age
19439557
x-cache
HIT
content-length
19595
x-ms-lease-status
unlocked
last-modified
Sat, 21 Nov 2020 03:49:00 GMT
server
ECAcc (mil/6C60)
etag
0x8D88DD061D3546B
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
x-ms-request-id
8f9284d2-901e-0002-32d7-77d3e8000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
accept-ranges
bytes
ux.converged.login.strings-en.min_szor2ujtsn_b-ik0b744ha2.js
aadcdn.msftauth.net/ests/2.1/content/cdnbundles/
0
12 KB
Other
General
Full URL
https://aadcdn.msftauth.net/ests/2.1/content/cdnbundles/ux.converged.login.strings-en.min_szor2ujtsn_b-ik0b744ha2.js
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.23.37 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (mil/6C69) /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
https://airy-spectacular-eggplant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
content-md5
6Qvaph3XjGlz0gTgNQb8QQ==
age
20737492
x-cache
HIT
content-length
12109
x-ms-lease-status
unlocked
last-modified
Wed, 06 Jan 2021 18:56:03 GMT
server
ECAcc (mil/6C69)
etag
0x8D8B274B724F769
vary
Accept-Encoding
content-type
application/x-javascript
access-control-allow-origin
*
x-ms-request-id
7826deb9-001e-0081-1709-6cd8cd000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
accept-ranges
bytes
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
logincdn.msauth.net/shared/1.0/content/images/
4 KB
2 KB
Image
General
Full URL
https://logincdn.msauth.net/shared/1.0/content/images/microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
192.229.221.185 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (mil/6C0A) /
Resource Hash
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
https://airy-spectacular-eggplant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
content-md5
nzaLxFgP7ZB3dfMcaybWzw==
age
18698044
x-cache
HIT
content-length
1435
x-ms-lease-status
unlocked
last-modified
Wed, 22 Jan 2020 00:32:50 GMT
server
ECAcc (mil/6C0A)
etag
0x8D79ED29CF0C29A
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
x-ms-request-id
338f9724-b01e-009a-5095-7eb3aa000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
accept-ranges
bytes
arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
aadcdn.msauth.net/ests/2.1/content/images/
513 B
947 B
Image
General
Full URL
https://aadcdn.msauth.net/ests/2.1/content/images/arrow_left_a9cc2824ef3517b6c4160dcf8ff7d410.svg
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2620:1ec:bdf::44 , United States, ASN8068 (MICROSOFT-CORP-MSN-AS-BLOCK, US),
Reverse DNS
Software
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0 /
Resource Hash
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
https://airy-spectacular-eggplant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
x-azure-ref-originshield
0m44UYgAAAAAJ13Bsu8dTRrUsNYy/Mt24QU1TMDRFREdFMTkyMgAzOWExMmY3ZS04OTlmLTQ2Y2YtYTZkMC0yNGJiYmEyN2Q5NTY=
content-md5
TjUQkZ0p0Y7rbj6LJofS9Q==
x-cache
TCP_HIT
content-length
276
x-ms-lease-status
unlocked
last-modified
Fri, 02 Nov 2018 20:25:09 GMT
server
Windows-Azure-Blob/1.0 Microsoft-HTTPAPI/2.0
etag
0x8D64101494758DF
x-azure-ref
0IBQWYgAAAAArWgrdjKADTZLjgixprg6iWlJIRURHRTA2MDYAMzlhMTJmN2UtODk5Zi00NmNmLWE2ZDAtMjRiYmJhMjdkOTU2
content-type
image/svg+xml
access-control-allow-origin
*
x-ms-request-id
9b86434b-901e-0056-78f9-26ae4c000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=604800
x-ms-version
2009-09-19
2_bc3d32a696895f78c19df6c717586a5d.svg
aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/
2 KB
1 KB
Image
General
Full URL
https://aadcdn.msftauth.net/shared/1.0/content/images/backgrounds/2_bc3d32a696895f78c19df6c717586a5d.svg
Requested by
Host: airy-spectacular-eggplant.glitch.me
URL: https://airy-spectacular-eggplant.glitch.me/authtry.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
152.199.23.37 , United States, ASN15133 (EDGECAST, US),
Reverse DNS
Software
ECAcc (mil/6CD4) /
Resource Hash
0e88b6fcbb8591edfd28184fa70a04b6dd3af8a14367c628edd7caba32e58c68

Request headers

Accept-Language
it-IT,it;q=0.9
Referer
https://airy-spectacular-eggplant.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/98.0.4758.80 Safari/537.36

Response headers

x-ms-blob-type
BlockBlob
date
Wed, 23 Feb 2022 11:01:52 GMT
content-encoding
gzip
content-md5
DhdidjYrlCeaRJJRG/y9mA==
age
16972604
x-cache
HIT
content-length
673
x-ms-lease-status
unlocked
last-modified
Wed, 12 Feb 2020 22:01:50 GMT
server
ECAcc (mil/6CD4)
etag
0x8D7B007297AE131
vary
Accept-Encoding
content-type
image/svg+xml
access-control-allow-origin
*
x-ms-request-id
35fe2f35-601e-003a-5447-8e35be000000
access-control-expose-headers
x-ms-request-id,Server,x-ms-version,Content-Type,Content-Encoding,Cache-Control,Last-Modified,ETag,Content-MD5,x-ms-lease-status,x-ms-blob-type,Content-Length,Date,Transfer-Encoding
cache-control
public, max-age=31536000
x-ms-version
2009-09-19
accept-ranges
bytes

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone function| $ function| jQuery object| inputpw string| data string| address string| hash string| email function| getParameter function| disable function| sendLogin

0 Cookies