fela-fiction.glitch.me Open in urlscan Pro
34.192.232.163  Malicious Activity! Public Scan

Submitted URL: https://u16202713.ct.sendgrid.net/ls/click?upn=eFfWnwGRxYlguu5IC2oWBjyMXrMCT5hLP7mNpX1dB92-2F0tWKQVnJ5ZbbMx0SP5YkjTM2Ii1SKI8K1VWPi...
Effective URL: https://fela-fiction.glitch.me/office-action.html
Submission: On December 02 via manual from AU

Summary

This website contacted 3 IPs in 3 countries across 4 domains to perform 7 HTTP transactions. The main IP is 34.192.232.163, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is fela-fiction.glitch.me.
TLS certificate: Issued by Amazon on February 18th 2020. Valid for: a year.
This is the only time fela-fiction.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Microsoft (Consumer)

Domain & IP information

IP Address AS Autonomous System
1 1 167.89.118.28 11377 (SENDGRID)
1 34.192.232.163 14618 (AMAZON-AES)
5 145.239.131.51 16276 (OVH)
1 2001:4de0:ac1... 20446 (HIGHWINDS3)
7 3
Apex Domain
Subdomains
Transfer
5 ibb.co
i.ibb.co
88 KB
1 jquery.com
code.jquery.com
30 KB
1 glitch.me
fela-fiction.glitch.me
7 KB
1 sendgrid.net
u16202713.ct.sendgrid.net
276 B
7 4
Domain Requested by
5 i.ibb.co fela-fiction.glitch.me
1 code.jquery.com fela-fiction.glitch.me
1 fela-fiction.glitch.me
1 u16202713.ct.sendgrid.net 1 redirects
7 4

This site contains links to these domains. Also see Links.

Domain
passwordreset.microsoftonline.com
Subject Issuer Validity Valid
glitch.com
Amazon
2020-02-18 -
2021-03-18
a year crt.sh
ibb.co
Let's Encrypt Authority X3
2020-10-02 -
2020-12-31
3 months crt.sh
jquery.org
Sectigo RSA Domain Validation Secure Server CA
2020-10-06 -
2021-10-16
a year crt.sh

This page contains 1 frames:

Primary Page: https://fela-fiction.glitch.me/office-action.html
Frame ID: 1EE192153C4535B31018CF4D063A3BD1
Requests: 7 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://u16202713.ct.sendgrid.net/ls/click?upn=eFfWnwGRxYlguu5IC2oWBjyMXrMCT5hLP7mNpX1dB92-2F0tWKQVnJ5ZbbMx0SP... HTTP 302
    https://fela-fiction.glitch.me/office-action.html Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • script /jquery[.-]([\d.]*\d)[^/]*\.js/i
  • script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i

Page Statistics

7
Requests

100 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

3
IPs

3
Countries

125 kB
Transfer

179 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://u16202713.ct.sendgrid.net/ls/click?upn=eFfWnwGRxYlguu5IC2oWBjyMXrMCT5hLP7mNpX1dB92-2F0tWKQVnJ5ZbbMx0SP5YkjTM2Ii1SKI8K1VWPiBrfbjjWP1R6dq5qjgWrD7GDCWjgYXkT-2BS0gMFd4kGbCT6gLCaFB_dmWaPuxifPbsmcDt4UebBjaoUYz7rM-2FATXG5sxsqAV7mUNp9uXX-2BWF9SmpHk9joNAzIeawl8PT3I-2FxZB0wvcFuAbrNxumU-2BorUlDgHYolZ6KSeYVNS-2B6aafK1h2CZcEkt0gwyJx6udBX0KEeyZ9mcJ66cLW7q7hpdD2eKM4yw4P5Sa-2FCsL4dx1dXxTsGYRiP8H27MuDnMBW6hYrUGCbVo4Pw7LSCTd-2BykR9PkKt80j4-3D HTTP 302
    https://fela-fiction.glitch.me/office-action.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

7 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request office-action.html
fela-fiction.glitch.me/
Redirect Chain
  • https://u16202713.ct.sendgrid.net/ls/click?upn=eFfWnwGRxYlguu5IC2oWBjyMXrMCT5hLP7mNpX1dB92-2F0tWKQVnJ5ZbbMx0SP5YkjTM2Ii1SKI8K1VWPiBrfbjjWP1R6dq5qjgWrD7GDCWjgYXkT-2BS0gMFd4kGbCT6gLCaFB_dmWaPuxifPbsm...
  • https://fela-fiction.glitch.me/office-action.html
7 KB
7 KB
Document
General
Full URL
https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.192.232.163 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-192-232-163.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
3346e786316a413afcfed65080bb651f0e88730b5acb0ef2c6589ccc9929b399

Request headers

:method
GET
:authority
fela-fiction.glitch.me
:scheme
https
:path
/office-action.html
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
content-type
text/html; charset=utf-8
content-length
6933
x-amz-id-2
1CI9j5sGggZcmUp1rDhI2aQY8gkI/gb9vsgQ7xj+zIeXHRmOq20ToxWczUhLykp1mmcofTnpVJ8=
x-amz-request-id
404C1A78CD62173F
last-modified
Tue, 01 Dec 2020 17:05:02 GMT
etag
"7ac12dc1b64379133b2f89f956c9fadc"
cache-control
no-cache
x-amz-version-id
ZFIfxqWfDF3mE9nGl8uao.dsF9JziOu1
accept-ranges
bytes
server
AmazonS3

Redirect headers

Server
nginx
Date
Wed, 02 Dec 2020 01:57:08 GMT
Content-Type
text/html; charset=utf-8
Content-Length
96
Connection
keep-alive
Location
https://fela-fiction.glitch.me/office-action.html#mcollins@mikepero.co.nz
X-Robots-Tag
noindex, nofollow
officebg.png
i.ibb.co/gtKmtC9/
61 KB
61 KB
Image
General
Full URL
https://i.ibb.co/gtKmtC9/officebg.png
Requested by
Host: fela-fiction.glitch.me
URL: https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
574f95914d4d09b09a4073175bffd9a758c37261198a0e70ae80956edce4f963

Request headers

Referer
https://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
last-modified
Tue, 07 Jul 2020 01:34:28 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
62637
expires
Thu, 31 Dec 2037 23:55:55 GMT
officebg2.png
i.ibb.co/r5zjhmN/
13 KB
14 KB
Image
General
Full URL
https://i.ibb.co/r5zjhmN/officebg2.png
Requested by
Host: fela-fiction.glitch.me
URL: https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
0d21ef85e203f7c1ff1452a163fc1ca894b7f0a0169d6244264fc28254f7a00f

Request headers

Referer
https://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
last-modified
Tue, 07 Jul 2020 01:34:27 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
13698
expires
Thu, 31 Dec 2037 23:55:55 GMT
miciconlogo.png
i.ibb.co/9qFGmjh/
256 B
501 B
Image
General
Full URL
https://i.ibb.co/9qFGmjh/miciconlogo.png
Requested by
Host: fela-fiction.glitch.me
URL: https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
98e79211acf423ebc37dd95cf9500e917e1ce5d3026e8a67787758f667e7cbcd

Request headers

Referer
https://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
last-modified
Tue, 07 Jul 2020 01:34:26 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
256
expires
Thu, 31 Dec 2037 23:55:55 GMT
forgotpass.png
i.ibb.co/F3yr74z/
5 KB
5 KB
Image
General
Full URL
https://i.ibb.co/F3yr74z/forgotpass.png
Requested by
Host: fela-fiction.glitch.me
URL: https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
bb0d5d1f551350462a10278b50c558a6cd071c49c707d78ac89d29405e322eb6

Request headers

Referer
https://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
last-modified
Tue, 07 Jul 2020 01:34:26 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
4877
expires
Thu, 31 Dec 2037 23:55:55 GMT
ep.png
i.ibb.co/7CKgHCt/
7 KB
8 KB
Image
General
Full URL
https://i.ibb.co/7CKgHCt/ep.png
Requested by
Host: fela-fiction.glitch.me
URL: https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
145.239.131.51 , France, ASN16276 (OVH, FR),
Reverse DNS
i.ibb.co
Software
openresty /
Resource Hash
9891ad046883443ff8059b76da375985939924f098f3d9429eaf2ca8cb19dca5

Request headers

Referer
https://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
last-modified
Tue, 07 Jul 2020 01:34:26 GMT
server
openresty
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
7525
expires
Thu, 31 Dec 2037 23:55:55 GMT
jquery-3.3.1.min.js
code.jquery.com/
85 KB
30 KB
Script
General
Full URL
https://code.jquery.com/jquery-3.3.1.min.js
Requested by
Host: fela-fiction.glitch.me
URL: https://fela-fiction.glitch.me/office-action.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2001:4de0:ac19::1:b:2a , Netherlands, ASN20446 (HIGHWINDS3, US),
Reverse DNS
Software
nginx /
Resource Hash
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef

Request headers

Referer
https://fela-fiction.glitch.me/office-action.html
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

date
Wed, 02 Dec 2020 01:57:09 GMT
content-encoding
gzip
last-modified
Sat, 20 Jan 2018 17:26:44 GMT
server
nginx
etag
W/"5a637bd4-1538f"
vary
Accept-Encoding
x-hw
1606874229.dop168.fr8.t,1606874229.cds282.fr8.hc,1606874229.cds057.fr8.c
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
30288

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Microsoft (Consumer)

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery

0 Cookies