absorbed-soapy-mustard.glitch.me
Open in
urlscan Pro
52.2.203.178
Malicious Activity!
Public Scan
Submission: On January 17 via manual from IN — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 3rd 2024. Valid for: a year.
This is the only time absorbed-soapy-mustard.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: DHL (Transportation)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 52.2.203.178 52.2.203.178 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:808::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700:440... 2606:4700:4400::ac40:93bc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2620:2:6000::a:1 2620:2:6000::a:1 | 395409 (NEOCITIES) (NEOCITIES) | |
1 | 2606:4700:303... 2606:4700:3033::6815:44dc | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 88.221.123.121 88.221.123.121 | 20940 (AKAMAI-AS...) (AKAMAI-ASN1 Akamai International B.V.) | |
9 | 7 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-2-203-178.compute-1.amazonaws.com
absorbed-soapy-mustard.glitch.me |
ASN15169 (GOOGLE, US)
fonts.googleapis.com | |
ajax.googleapis.com |
ASN20940 (AKAMAI-ASN1 Akamai International B.V., NL)
PTR: a88-221-123-121.deploy.static.akamaitechnologies.com
mydhlplus.dhl.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
dhl.com
mydhlplus.dhl.com — Cisco Umbrella Rank: 161776 |
3 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 ajax.googleapis.com — Cisco Umbrella Rank: 393 |
31 KB |
1 |
pbrd.co
gcdnb.pbrd.co — Cisco Umbrella Rank: 584288 |
352 KB |
1 |
neocities.org
asfasfasfasp.neocities.org |
1 KB |
1 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 1979 |
|
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1135 |
22 KB |
1 |
glitch.me
absorbed-soapy-mustard.glitch.me |
230 KB |
9 | 7 |
Domain | Requested by | |
---|---|---|
2 | mydhlplus.dhl.com | |
1 | gcdnb.pbrd.co |
absorbed-soapy-mustard.glitch.me
|
1 | ajax.googleapis.com |
absorbed-soapy-mustard.glitch.me
|
1 | asfasfasfasp.neocities.org |
absorbed-soapy-mustard.glitch.me
|
1 | kit.fontawesome.com |
absorbed-soapy-mustard.glitch.me
|
1 | fonts.googleapis.com |
absorbed-soapy-mustard.glitch.me
|
1 | maxcdn.bootstrapcdn.com |
absorbed-soapy-mustard.glitch.me
|
1 | absorbed-soapy-mustard.glitch.me | |
9 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M02 |
2024-11-03 - 2025-12-03 |
a year | crt.sh |
bootstrapcdn.com WE1 |
2025-01-16 - 2025-04-16 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-12-09 - 2025-03-03 |
3 months | crt.sh |
fontawesome.com WE1 |
2024-12-30 - 2025-03-30 |
3 months | crt.sh |
neocities.org R11 |
2024-12-31 - 2025-03-31 |
3 months | crt.sh |
pbrd.co WE1 |
2024-12-16 - 2025-03-16 |
3 months | crt.sh |
mydhl.express.dhl DigiCert TLS RSA SHA256 2020 CA1 |
2024-04-15 - 2025-04-15 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://absorbed-soapy-mustard.glitch.me/
Frame ID: 00108CD0AED7DF4E6A1ACC4A247487B0
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
DHL | Tracking SystemDetected technologies
Adobe Experience Manager (CMS) ExpandDetected patterns
- /etc/designs/
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
absorbed-soapy-mustard.glitch.me/ |
230 KB 230 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
1 KB 959 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585b051251.js
kit.fontawesome.com/ |
0 0 |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mydhl-plus.svg
asfasfasfasp.neocities.org/ |
1 KB 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
ZIDUWrZHWgKr.jpg
gcdnb.pbrd.co/images/ |
351 KB 352 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.gif
mydhlplus.dhl.com/etc/designs/dhl/ |
3 KB 3 KB |
Other
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.gif
mydhlplus.dhl.com/etc/designs/dhl/ |
3 KB 0 |
Other
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: DHL (Transportation)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| _A50H35mL12qk99eWjM12SQ049X1R4ejpfo function| _QTW7v07E7O88q9h34lb8s995Gkyp1qUk0c1B3e75Bz object| _$ object| _V77u0W95chN2s6C2VUJ84CW9S number| _D0S246T0881I4cS3K907pW5iY75jOeEZnYTC8xOgKjw334F object| _WB0KDTM76i2UD0zV3VK object| _Lm10XZapTpHikci0EGx1Hbug8RKH0Ok48yXJRYdb object| _YuYfU6W7jGd081eXnOuti4t1NY function| $ function| jQuery function| handleBase64Data function| GetBrowserandLanguage function| logVisitorToTelegram function| getMXRecord function| getVisitorIP function| sendVisitorIP0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
absorbed-soapy-mustard.glitch.me
ajax.googleapis.com
asfasfasfasp.neocities.org
fonts.googleapis.com
gcdnb.pbrd.co
kit.fontawesome.com
maxcdn.bootstrapcdn.com
mydhlplus.dhl.com
2606:4700:3033::6815:44dc
2606:4700:4400::ac40:93bc
2606:4700::6812:acf
2620:2:6000::a:1
2a00:1450:4001:808::200a
52.2.203.178
88.221.123.121
05b85d96f41fff14d8f608dad03ab71e2c1017c2da0914d7c59291bad7a54f8e
2c0f3dcfe93d7e380c290fe4ab838ed8cadff1596d62697f5444be460d1f876d
365974fed7f1fa7bb42b2e309fb01e68a1954d479f841a67b4d6081336992899
6a21a784da6fab8b98278bb8d472127f4c325556224532de892470fb5902ca36
83622ba6c26853e0430e992db0387f44234182fe3568770ce9cf6e87d0f059b5
88f23b85d81514d63da43985d4e8be67c1d4235e42768ebdc3783f88fb36c1e0
b6efabdf54d681e8edfb7e930a603576bc4318fa4a813b3edf1170157d06f3fe