fela-fiction.glitch.me
Open in
urlscan Pro
34.192.232.163
Malicious Activity!
Public Scan
Effective URL: https://fela-fiction.glitch.me/office-action.html
Submission: On December 02 via manual from AU
Summary
TLS certificate: Issued by Amazon on February 18th 2020. Valid for: a year.
This is the only time fela-fiction.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.28 167.89.118.28 | 11377 (SENDGRID) (SENDGRID) | |
1 | 34.192.232.163 34.192.232.163 | 14618 (AMAZON-AES) (AMAZON-AES) | |
5 | 145.239.131.51 145.239.131.51 | 16276 (OVH) (OVH) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2a | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
7 | 3 |
ASN11377 (SENDGRID, US)
PTR: o16789118x28.outbound-mail.sendgrid.net
u16202713.ct.sendgrid.net |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-192-232-163.compute-1.amazonaws.com
fela-fiction.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
ibb.co
i.ibb.co |
88 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
glitch.me
fela-fiction.glitch.me |
7 KB |
1 |
sendgrid.net
1 redirects
u16202713.ct.sendgrid.net |
276 B |
7 | 4 |
Domain | Requested by | |
---|---|---|
5 | i.ibb.co |
fela-fiction.glitch.me
|
1 | code.jquery.com |
fela-fiction.glitch.me
|
1 | fela-fiction.glitch.me | |
1 | u16202713.ct.sendgrid.net | 1 redirects |
7 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
passwordreset.microsoftonline.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2020-02-18 - 2021-03-18 |
a year | crt.sh |
ibb.co Let's Encrypt Authority X3 |
2020-10-02 - 2020-12-31 |
3 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://fela-fiction.glitch.me/office-action.html
Frame ID: 1EE192153C4535B31018CF4D063A3BD1
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u16202713.ct.sendgrid.net/ls/click?upn=eFfWnwGRxYlguu5IC2oWBjyMXrMCT5hLP7mNpX1dB92-2F0tWKQVnJ5ZbbMx0SP...
HTTP 302
https://fela-fiction.glitch.me/office-action.html Page URL
Detected technologies
Amazon Web Services (PaaS) ExpandDetected patterns
- headers server /^AmazonS3$/i
Amazon S3 (Miscellaneous) Expand
Detected patterns
- headers server /^AmazonS3$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u16202713.ct.sendgrid.net/ls/click?upn=eFfWnwGRxYlguu5IC2oWBjyMXrMCT5hLP7mNpX1dB92-2F0tWKQVnJ5ZbbMx0SP5YkjTM2Ii1SKI8K1VWPiBrfbjjWP1R6dq5qjgWrD7GDCWjgYXkT-2BS0gMFd4kGbCT6gLCaFB_dmWaPuxifPbsmcDt4UebBjaoUYz7rM-2FATXG5sxsqAV7mUNp9uXX-2BWF9SmpHk9joNAzIeawl8PT3I-2FxZB0wvcFuAbrNxumU-2BorUlDgHYolZ6KSeYVNS-2B6aafK1h2CZcEkt0gwyJx6udBX0KEeyZ9mcJ66cLW7q7hpdD2eKM4yw4P5Sa-2FCsL4dx1dXxTsGYRiP8H27MuDnMBW6hYrUGCbVo4Pw7LSCTd-2BykR9PkKt80j4-3D
HTTP 302
https://fela-fiction.glitch.me/office-action.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
office-action.html
fela-fiction.glitch.me/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
officebg.png
i.ibb.co/gtKmtC9/ |
61 KB 61 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
officebg2.png
i.ibb.co/r5zjhmN/ |
13 KB 14 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
miciconlogo.png
i.ibb.co/9qFGmjh/ |
256 B 501 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
forgotpass.png
i.ibb.co/F3yr74z/ |
5 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ep.png
i.ibb.co/7CKgHCt/ |
7 KB 8 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.3.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
fela-fiction.glitch.me
i.ibb.co
u16202713.ct.sendgrid.net
145.239.131.51
167.89.118.28
2001:4de0:ac19::1:b:2a
34.192.232.163
0d21ef85e203f7c1ff1452a163fc1ca894b7f0a0169d6244264fc28254f7a00f
160a426ff2894252cd7cebbdd6d6b7da8fcd319c65b70468f10b6690c45d02ef
3346e786316a413afcfed65080bb651f0e88730b5acb0ef2c6589ccc9929b399
574f95914d4d09b09a4073175bffd9a758c37261198a0e70ae80956edce4f963
9891ad046883443ff8059b76da375985939924f098f3d9429eaf2ca8cb19dca5
98e79211acf423ebc37dd95cf9500e917e1ce5d3026e8a67787758f667e7cbcd
bb0d5d1f551350462a10278b50c558a6cd071c49c707d78ac89d29405e322eb6