dented-dull-cell.glitch.me Open in urlscan Pro
3.93.29.231  Malicious Activity! Public Scan

URL: https://dented-dull-cell.glitch.me/bnd.html
Submission: On September 28 via manual from US — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 3.93.29.231, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is dented-dull-cell.glitch.me.
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time dented-dull-cell.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Emirates NBD (Banking)

Domain & IP information

IP Address AS Autonomous System
1 3.93.29.231 14618 (AMAZON-AES)
1 51.210.32.132 16276 (OVH)
1 2606:4700:303... 13335 (CLOUDFLAR...)
3 3
Apex Domain
Subdomains
Transfer
1 pbrd.co
gcdnb.pbrd.co — Cisco Umbrella Rank: 991402
1 ibb.co
i.ibb.co — Cisco Umbrella Rank: 13198
4 KB
1 glitch.me
dented-dull-cell.glitch.me
254 KB
3 3
Domain Requested by
1 gcdnb.pbrd.co dented-dull-cell.glitch.me
1 i.ibb.co dented-dull-cell.glitch.me
1 dented-dull-cell.glitch.me
3 3

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2022-02-01 -
2023-03-02
a year crt.sh
ibb.co
R3
2022-08-07 -
2022-11-05
3 months crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-08-03 -
2023-08-03
a year crt.sh

This page contains 1 frames:

Primary Page: https://dented-dull-cell.glitch.me/bnd.html
Frame ID: 36694BBEAE167AA533DFCF6BC1ED2C00
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Emirates NBD Bank

Page Statistics

3
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

258 kB
Transfer

257 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request bnd.html
dented-dull-cell.glitch.me/
253 KB
254 KB
Document
General
Full URL
https://dented-dull-cell.glitch.me/bnd.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.93.29.231 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-93-29-231.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
9b4a9b598f9e32ab1e7f1fdb1d418b4870ec9caeb77cfa44fa65162c308a07db

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
259421
content-type
text/html; charset=utf-8
date
Wed, 28 Sep 2022 12:14:39 GMT
etag
"71bd4b157d67ec365bfe194203bd2572"
last-modified
Mon, 05 Sep 2022 00:34:55 GMT
server
AmazonS3
x-amz-id-2
U6Ah1/PbC1r6GTShKYaknxqS7XnMCKJjGrfvoMXUkbkrIojzG0Mk8XTtWYGsRiXWK5Ek+E/cZZM=
x-amz-request-id
A2M5K8N7NRGAC75V
x-amz-version-id
HQWqN42YKwzXd_nY4MjNR6.JwsYl6KQG
logo-new.png
i.ibb.co/sQ23tY6/
4 KB
4 KB
Image
General
Full URL
https://i.ibb.co/sQ23tY6/logo-new.png
Requested by
Host: dented-dull-cell.glitch.me
URL: https://dented-dull-cell.glitch.me/bnd.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
51.210.32.132 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3172604.ip-51-210-32.eu
Software
nginx /
Resource Hash
1b1e118aa366f9fb3d007b32e059b0ed5220af4b50d7385f99604d3896188c15

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://dented-dull-cell.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36

Response headers

date
Wed, 28 Sep 2022 12:14:40 GMT
last-modified
Thu, 05 May 2022 21:15:29 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
3960
expires
Thu, 31 Dec 2037 23:55:55 GMT
Ag8nph4qZegW.jpg
gcdnb.pbrd.co/images/
0
0
Image
General
Full URL
https://gcdnb.pbrd.co/images/Ag8nph4qZegW.jpg?o=1
Requested by
Host: dented-dull-cell.glitch.me
URL: https://dented-dull-cell.glitch.me/bnd.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3033::6815:44dc , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://dented-dull-cell.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/106.0.5249.61 Safari/537.36

Response headers

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Emirates NBD (Banking)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://gcdnb.pbrd.co/images/Ag8nph4qZegW.jpg?o=1
Message:
Failed to load resource: the server responded with a status of 404 ()