fela-fiction.glitch.me Open in urlscan Pro
34.232.125.220  Malicious Activity! Public Scan

URL: http://fela-fiction.glitch.me/office-action.html
Submission: On December 02 via automatic, source openphish

Summary

This website contacted 3 IPs in 3 countries across 3 domains to perform 7 HTTP transactions. The main IP is 34.232.125.220, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is fela-fiction.glitch.me.
This is the only time fela-fiction.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 34.232.125.220 14618 (AMAZON-AES)
5 145.239.131.55 16276 (OVH)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
7 3
Apex Domain
Subdomains
Transfer
5 ibb.co
i.ibb.co
88 KB
1 jquery.com
code.jquery.com
30 KB
1 glitch.me
fela-fiction.glitch.me
7 KB
7 3
Domain Requested by
5 i.ibb.co fela-fiction.glitch.me
1 code.jquery.com fela-fiction.glitch.me
1 fela-fiction.glitch.me
7 3

This site contains links to these domains. Also see Links.

Domain
passwordreset.microsoftonline.com
Subject Issuer Validity Valid
ibb.co
Let's Encrypt Authority X3
2020-10-02 -
2020-12-31
3 months crt.sh
jquery.org
Sectigo RSA Domain Validation Secure Server CA
2020-10-06 -
2021-10-16
a year crt.sh

This page contains 1 frames:

Primary Page: http://fela-fiction.glitch.me/office-action.html
Frame ID: 71B7202A38F18AA820ED57B2A08D38E9
Requests: 7 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

7
Requests

86 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

3
Countries

125 kB
Transfer

179 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request office-action.html
fela-fiction.glitch.me/
7 KB
7 KB
Document
General
Full URL
http://fela-fiction.glitch.me/office-action.html
Protocol
HTTP/1.1
Server
34.232.125.220 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-232-125-220.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
3346e786316a413afcfed65080bb651f0e88730b5acb0ef2c6589ccc9929b399

Request headers

Host
fela-fiction.glitch.me
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Wed, 02 Dec 2020 13:29:03 GMT
Content-Type
text/html; charset=utf-8
Content-Length
6933
Connection
keep-alive
x-amz-id-2
OEFK4z9vpY8sTzH5A9hMhKY1aezTPnh4kwBIwIYqQYZ7oA/8XjIbNx9TnxxdpvuI1vCYI4jagGI=
x-amz-request-id
8T8P6QAK3Q1V4Y9Y
last-modified
Tue, 01 Dec 2020 17:05:02 GMT
etag
"7ac12dc1b64379133b2f89f956c9fadc"
cache-control
no-cache
x-amz-version-id
ZFIfxqWfDF3mE9nGl8uao.dsF9JziOu1
accept-ranges
bytes
server
AmazonS3
officebg.png
i.ibb.co/gtKmtC9/
61 KB
61 KB
Image
General
Full URL
https://i.ibb.co/gtKmtC9/officebg.png
Requested by
Host: fela-fiction.glitch.me
URL: http://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.55 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
574f95914d4d09b09a4073175bffd9a758c37261198a0e70ae80956edce4f963

Request headers

Referer
http://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 13:29:03 GMT
last-modified
Tue, 07 Jul 2020 01:34:28 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
62637
expires
Thu, 31 Dec 2037 23:55:55 GMT
officebg2.png
i.ibb.co/r5zjhmN/
13 KB
14 KB
Image
General
Full URL
https://i.ibb.co/r5zjhmN/officebg2.png
Requested by
Host: fela-fiction.glitch.me
URL: http://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.55 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
0d21ef85e203f7c1ff1452a163fc1ca894b7f0a0169d6244264fc28254f7a00f

Request headers

Referer
http://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 13:29:03 GMT
last-modified
Tue, 07 Jul 2020 01:34:27 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
13698
expires
Thu, 31 Dec 2037 23:55:55 GMT
miciconlogo.png
i.ibb.co/9qFGmjh/
256 B
501 B
Image
General
Full URL
https://i.ibb.co/9qFGmjh/miciconlogo.png
Requested by
Host: fela-fiction.glitch.me
URL: http://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.55 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
98e79211acf423ebc37dd95cf9500e917e1ce5d3026e8a67787758f667e7cbcd

Request headers

Referer
http://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 13:29:03 GMT
last-modified
Tue, 07 Jul 2020 01:34:26 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
256
expires
Thu, 31 Dec 2037 23:55:55 GMT
forgotpass.png
i.ibb.co/F3yr74z/
5 KB
5 KB
Image
General
Full URL
https://i.ibb.co/F3yr74z/forgotpass.png
Requested by
Host: fela-fiction.glitch.me
URL: http://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.55 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
bb0d5d1f551350462a10278b50c558a6cd071c49c707d78ac89d29405e322eb6

Request headers

Referer
http://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 13:29:03 GMT
last-modified
Tue, 07 Jul 2020 01:34:26 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
4877
expires
Thu, 31 Dec 2037 23:55:55 GMT
ep.png
i.ibb.co/7CKgHCt/
7 KB
8 KB
Image
General
Full URL
https://i.ibb.co/7CKgHCt/ep.png
Requested by
Host: fela-fiction.glitch.me
URL: http://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.55 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
9891ad046883443ff8059b76da375985939924f098f3d9429eaf2ca8cb19dca5

Request headers

Referer
http://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 13:29:03 GMT
last-modified
Tue, 07 Jul 2020 01:34:26 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
7525
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery-3.3.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.3.1.min.js
Requested by
Host: fela-fiction.glitch.me
URL: http://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:1a , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

Request headers

Referer
http://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 13:29:03 GMT
content-encoding
gzip
last-modified
Sat, 20 Jan 2018 17:26:44 GMT
server
nginx
etag
W/"5a637bd4-1538f"
vary
Accept-Encoding
x-hw
1606915743.dop135.fr8.t,1606915743.cds222.fr8.hc,1606915743.cds057.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30288

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery

0 Cookies