cdn.glitch.com
Open in
urlscan Pro
143.204.202.11
Malicious Activity!
Public Scan
Submission: On March 31 via api from US
Summary
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time cdn.glitch.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 143.204.202.11 143.204.202.11 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 1 |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-202-11.fra53.r.cloudfront.net
cdn.glitch.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
glitch.com
cdn.glitch.com |
41 KB |
1 | 1 |
Domain | Requested by | |
---|---|---|
1 | cdn.glitch.com | |
1 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2021-01-18 - 2022-02-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cdn.glitch.com/e65b120f-b033-4153-8f73-22473e531ef0/icon.ico
Frame ID: D8ABFB8876B9A33997178D5246F810A3
Requests: 1 HTTP requests in this frame
Screenshot
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers via /\(CloudFront\)$/i
- headers server /^AmazonS3$/i
Amazon Cloudfront (CDN) Expand
Detected patterns
- headers via /\(CloudFront\)$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
1 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
icon.ico
cdn.glitch.com/e65b120f-b033-4153-8f73-22473e531ef0/ |
41 KB 41 KB |
Document
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.glitch.com
143.204.202.11
d12161435ace47c6883360e08466508593325f134c1852b1d0e6e75d5f76adda