adventurous-frequent-jewel.glitch.me
Open in
urlscan Pro
3.208.50.197
Malicious Activity!
Public Scan
Submission: On March 29 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time adventurous-frequent-jewel.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 3.208.50.197 3.208.50.197 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:2800:233... 2606:2800:233:78b9:f44e:2c1f:31aa:d9ef | 15133 (EDGECAST) (EDGECAST) | |
1 1 | 199.232.196.193 199.232.196.193 | 54113 (FASTLY) (FASTLY) | |
1 | 146.75.116.193 146.75.116.193 | 54113 (FASTLY) (FASTLY) | |
1 | 2a02:ec80:300... 2a02:ec80:300:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
4 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-208-50-197.compute-1.amazonaws.com
adventurous-frequent-jewel.glitch.me |
ASN15133 (EDGECAST, US)
aadcdn.msftauth.net |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
imgur.com
1 redirects
imgur.com — Cisco Umbrella Rank: 5326 i.imgur.com — Cisco Umbrella Rank: 8019 |
279 KB |
1 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 2958 |
99 KB |
1 |
msftauth.net
aadcdn.msftauth.net — Cisco Umbrella Rank: 956 |
2 KB |
1 |
glitch.me
adventurous-frequent-jewel.glitch.me |
5 KB |
4 | 4 |
Domain | Requested by | |
---|---|---|
1 | upload.wikimedia.org | |
1 | i.imgur.com |
adventurous-frequent-jewel.glitch.me
|
1 | imgur.com | 1 redirects |
1 | aadcdn.msftauth.net |
adventurous-frequent-jewel.glitch.me
|
1 | adventurous-frequent-jewel.glitch.me | |
4 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
aadcdn.msftauth.net DigiCert SHA2 Secure Server CA |
2023-12-01 - 2024-12-01 |
a year | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2023-10-18 - 2024-10-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://adventurous-frequent-jewel.glitch.me/Kar24ur132ys.html
Frame ID: D3B88C5D6063D1D349B6E7A1BC418FFE
Requests: 4 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://imgur.com/vAVJT9c.png HTTP 301
- https://i.imgur.com/vAVJT9c.png
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
Kar24ur132ys.html
adventurous-frequent-jewel.glitch.me/ |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
microsoft_logo_ee5c8d9fb6248c938fd0dc19370e90bd.svg
aadcdn.msftauth.net/shared/1.0/content/images/ |
4 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vAVJT9c.png
i.imgur.com/ Redirect Chain
|
278 KB 279 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2203px-Microsoft_Office_Excel_%282019%E2%80%93present%29.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/3/34/Microsoft_Office_Excel_%282019%E2%80%93present%29.svg/ |
98 KB 99 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onpagereveal0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aadcdn.msftauth.net
adventurous-frequent-jewel.glitch.me
i.imgur.com
imgur.com
upload.wikimedia.org
146.75.116.193
199.232.196.193
2606:2800:233:78b9:f44e:2c1f:31aa:d9ef
2a02:ec80:300:ed1a::2:b
3.208.50.197
04d29248ee3a13a074518c93a18d6efc491bf1f298f9b87fc989a6ae4b9fad7a
0cc3fed62e8b1f2d7c8f2a6937957914c8e8abfa355f57906053e3d274d238b7
32d6b5039dd56f1484ef8670ee8e8033337b627dde78c6bbf515bfac27ef944c
d1e65d28af30495e7f519c11c5889c069e4973d2d237422fe6ad4c180b50f94d