shelled-automatic-dinghy.glitch.me Open in urlscan Pro
18.233.217.16  Malicious Activity! Public Scan

URL: http://shelled-automatic-dinghy.glitch.me/
Submission: On November 18 via manual from GB

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 6 HTTP transactions. The main IP is 18.233.217.16, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is shelled-automatic-dinghy.glitch.me.
This is the only time shelled-automatic-dinghy.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: WeTransfer (Online)

Domain & IP information

IP Address AS Autonomous System
4 18.233.217.16 14618 (AMAZON-AES)
1 35.197.18.156 15169 (GOOGLE)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
6 4
Domain Requested by
4 shelled-automatic-dinghy.glitch.me shelled-automatic-dinghy.glitch.me
1 code.jquery.com shelled-automatic-dinghy.glitch.me
1 blog.thunderbird.net shelled-automatic-dinghy.glitch.me
6 3

This site contains links to these domains. Also see Links.

Domain
wetransfer.zendesk.com
wetransfer.com
Subject Issuer Validity Valid
blog.thunderbird.net
Let's Encrypt Authority X3
2020-10-12 -
2021-01-10
3 months crt.sh
jquery.org
Sectigo RSA Domain Validation Secure Server CA
2020-10-06 -
2021-10-16
a year crt.sh

This page contains 1 frames:

Primary Page: http://shelled-automatic-dinghy.glitch.me/
Frame ID: 08FBEF5247E31DEBBD0BD963FCA14121
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 50%
Detected patterns
  • meta csrf-param /^authenticity_token$/i

Overall confidence: 50%
Detected patterns
  • meta csrf-param /^authenticity_token$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Page Statistics

6
Requests

33 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

939 kB
Transfer

1397 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
shelled-automatic-dinghy.glitch.me/
905 KB
905 KB
Document
General
Full URL
http://shelled-automatic-dinghy.glitch.me/
Protocol
HTTP/1.1
Server
18.233.217.16 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-18-233-217-16.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
ac31dce28251e2634e32d96434b2d6d1b32c27d47474bccea6ee216373088d4e

Request headers

Host
shelled-automatic-dinghy.glitch.me
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 18 Nov 2020 11:20:57 GMT
Content-Type
text/html; charset=utf-8
Content-Length
926365
Connection
keep-alive
x-amz-id-2
G1qIni01swo2upQDmQfg6ScqbGWagl7kBnm6locxGl55DkiIMPXmb0Vfs7Yv1v6X3rWl2ymwLCU=
x-amz-request-id
8DB728ACBE352631
last-modified
Mon, 16 Nov 2020 19:58:49 GMT
etag
"a1cf5312bf676502d798ea721958c848"
cache-control
no-cache
x-amz-version-id
6A3BFY8mqUAFQm7gufXA.SDnd2oRpbWy
accept-ranges
bytes
server
AmazonS3
jquery.min.js.download
shelled-automatic-dinghy.glitch.me/WeTransfer_files/
0
0
Script
General
Full URL
http://shelled-automatic-dinghy.glitch.me/WeTransfer_files/jquery.min.js.download
Requested by
Host: shelled-automatic-dinghy.glitch.me
URL: http://shelled-automatic-dinghy.glitch.me/
Protocol
HTTP/1.1
Server
18.233.217.16 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-18-233-217-16.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
http://shelled-automatic-dinghy.glitch.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 18 Nov 2020 11:20:58 GMT
Cache-Control
max-age=0
Connection
keep-alive
Content-Length
2382
bootstrap.min.js.download
shelled-automatic-dinghy.glitch.me/WeTransfer_files/
0
0
Script
General
Full URL
http://shelled-automatic-dinghy.glitch.me/WeTransfer_files/bootstrap.min.js.download
Requested by
Host: shelled-automatic-dinghy.glitch.me
URL: http://shelled-automatic-dinghy.glitch.me/
Protocol
HTTP/1.1
Server
18.233.217.16 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-18-233-217-16.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
http://shelled-automatic-dinghy.glitch.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 18 Nov 2020 11:20:58 GMT
Cache-Control
max-age=0
Connection
keep-alive
Content-Length
2382
truncated
/
404 KB
0
Stylesheet
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d427514a08d01168a2d132a8cc9ae70ec0a4e95f8e4f905fa50e2a70b34ef575

Request headers

Referer
http://shelled-automatic-dinghy.glitch.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
text/css
wetransfer-workmark-website.png
blog.thunderbird.net/files/2019/05/
4 KB
4 KB
Image
General
Full URL
https://blog.thunderbird.net/files/2019/05/wetransfer-workmark-website.png
Requested by
Host: shelled-automatic-dinghy.glitch.me
URL: http://shelled-automatic-dinghy.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
35.197.18.156 Mountain View, United States, ASN15169 (GOOGLE, US),
Reverse DNS
156.18.197.35.bc.googleusercontent.com
Software
nginx /
Resource Hash
33068b31229eafcb20e2d8679d02ac8697f0b74fc659648591ceed3711a66bbf

Request headers

Referer
http://shelled-automatic-dinghy.glitch.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 18 Nov 2020 11:20:59 GMT
last-modified
Tue, 07 May 2019 16:12:15 GMT
server
nginx
status
200
etag
"5cd1ae5f-1103"
vary
Accept-Encoding
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
content-length
4355
bootstrap.min.js.download
shelled-automatic-dinghy.glitch.me/WeTransfer_files/
0
0
Script
General
Full URL
http://shelled-automatic-dinghy.glitch.me/WeTransfer_files/bootstrap.min.js.download
Requested by
Host: shelled-automatic-dinghy.glitch.me
URL: http://shelled-automatic-dinghy.glitch.me/
Protocol
HTTP/1.1
Server
18.233.217.16 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-18-233-217-16.compute-1.amazonaws.com
Software
/
Resource Hash

Request headers

Referer
http://shelled-automatic-dinghy.glitch.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 18 Nov 2020 11:20:58 GMT
Cache-Control
max-age=0
Connection
keep-alive
Content-Length
2382
jquery-3.1.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.1.1.min.js
Requested by
Host: shelled-automatic-dinghy.glitch.me
URL: http://shelled-automatic-dinghy.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:2b , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
85556761a8800d14ced8fcd41a6b8b26bf012d44a318866c0d81a62092efd9bf

Request headers

Referer
http://shelled-automatic-dinghy.glitch.me/
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Wed, 18 Nov 2020 11:21:02 GMT
content-encoding
gzip
last-modified
Thu, 22 Sep 2016 22:32:34 GMT
server
nginx
status
200
etag
W/"57e45c02-152b5"
vary
Accept-Encoding
x-hw
1605698462.dop057.fr8.t,1605698462.cds290.fr8.hc,1605698462.cds012.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30070

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: WeTransfer (Online)

19 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| trustedTypes object| _preloaded_transfer_ function| validateForm undefined| ctx undefined| al undefined| start undefined| cw undefined| ch undefined| diff undefined| sim function| progressSim function| triggerError function| closeModal function| reset object| Wallpapers function| $ function| jQuery function| true_email

0 Cookies