hexagonal-ash-ambulance.glitch.me Open in urlscan Pro
3.231.39.129  Malicious Activity! Public Scan

Submitted URL: https://is.gd/XXlNoA
Effective URL: https://hexagonal-ash-ambulance.glitch.me/
Submission Tags: 6928710
Submission: On January 20 via api from NL

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 3.231.39.129, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is hexagonal-ash-ambulance.glitch.me.
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time hexagonal-ash-ambulance.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: DHL (Transportation)

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:20:... 13335 (CLOUDFLAR...)
1 3.231.39.129 14618 (AMAZON-AES)
1 2
Apex Domain
Subdomains
Transfer
1 glitch.me
hexagonal-ash-ambulance.glitch.me
2 MB
1 is.gd
is.gd
595 B
1 2
Domain Requested by
1 hexagonal-ash-ambulance.glitch.me
1 is.gd 1 redirects
1 2

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2021-01-18 -
2022-02-15
a year crt.sh

This page contains 1 frames:

Primary Page: https://hexagonal-ash-ambulance.glitch.me/
Frame ID: 02319CF52BF1D42D88898EF6648D506E
Requests: 4 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://is.gd/XXlNoA HTTP 301
    https://hexagonal-ash-ambulance.glitch.me/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Page Statistics

1
Requests

100 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

1597 kB
Transfer

2680 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://is.gd/XXlNoA HTTP 301
    https://hexagonal-ash-ambulance.glitch.me/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
hexagonal-ash-ambulance.glitch.me/
Redirect Chain
  • https://is.gd/XXlNoA
  • https://hexagonal-ash-ambulance.glitch.me/
2 MB
2 MB
Document
General
Full URL
https://hexagonal-ash-ambulance.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.231.39.129 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-231-39-129.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
1d0b0a1efd063b72fe56d7aba280c99781c191ee6c89a40133057e16d4717168

Request headers

:method
GET
:authority
hexagonal-ash-ambulance.glitch.me
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 20 Jan 2021 14:08:20 GMT
content-type
text/html; charset=utf-8
content-length
1633532
x-amz-id-2
wTeTwx+1Ujr3atbgtz1TMfAODiODOcL/3AefNQ8HXSqbuCF93IGze6LU7gRseCWkHBcQqFNQ/0I=
x-amz-request-id
82038109B5312BF5
last-modified
Sat, 16 Jan 2021 15:03:37 GMT
etag
"7bfff80210d1c22f2070290f07097309"
cache-control
no-cache
x-amz-version-id
0vcCW3ABUfqGkvEyXIXwl40BXKxd3j6I
accept-ranges
bytes
server
AmazonS3

Redirect headers

date
Wed, 20 Jan 2021 14:08:20 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=d1a657742b7c22c3cc65891e1e8c65f461611151700; expires=Fri, 19-Feb-21 14:08:20 GMT; path=/; domain=.is.gd; HttpOnly; SameSite=Lax; Secure
location
https://hexagonal-ash-ambulance.glitch.me/
cf-cache-status
DYNAMIC
cf-request-id
07c1b9095d0000177290954000000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"group":"cf-nel","endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=XlZibgDPJSXVf0jBkAgfpJ74Vq3KbvE7oMeWnGPWCFTbnOEq%2BSY9g6xpuCEd88KWv2sKzw46K3rpVVGeIDX1IjIbfJtfyhwpbZQhnIr3y74nAg%3D%3D"}],"max_age":604800}
nel
{"report_to":"cf-nel","max_age":604800}
server
cloudflare
cf-ray
61495deef9c71772-FRA
truncated
/
55 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9e7daf828ab92681934468b4d7fe32b16686b819f7d79079dd55b6b969541c93

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
35 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ffcc6dc74417e3a4b2d600ddeb06cc55a11ba5e3c55577dbb328d9d913ea8d5c

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
995 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
17abcd3de5fa56570a1becea0ef70a7c81b29d8606e9ae0817243f99d3e416c3

Request headers

Referer
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
image/gif

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: DHL (Transportation)

10 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| validateForm

0 Cookies