6tyuvg.glitch.me
Open in
urlscan Pro
34.227.137.223
Malicious Activity!
Public Scan
Submission: On September 14 via automatic, source phishtank — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M01 on February 22nd 2023. Valid for: a year.
This is the only time 6tyuvg.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 34.227.137.223 34.227.137.223 | 14618 (AMAZON-AES) (AMAZON-AES) | |
3 | 2606:4700::68... 2606:4700::6810:5614 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 151.101.194.132 151.101.194.132 | 54113 (FASTLY) (FASTLY) | |
1 2 | 2606:4700::68... 2606:4700::6810:7daf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-227-137-223.compute-1.amazonaws.com
6tyuvg.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
glitch.global
cdn.glitch.global — Cisco Umbrella Rank: 198856 |
231 KB |
3 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 364 |
163 KB |
2 |
unpkg.com
1 redirects
unpkg.com — Cisco Umbrella Rank: 1083 |
13 KB |
2 |
glitch.me
6tyuvg.glitch.me |
95 KB |
11 | 4 |
Domain | Requested by | |
---|---|---|
5 | cdn.glitch.global |
6tyuvg.glitch.me
|
3 | cdn.jsdelivr.net |
6tyuvg.glitch.me
cdn.jsdelivr.net |
2 | unpkg.com |
1 redirects
6tyuvg.glitch.me
|
2 | 6tyuvg.glitch.me |
6tyuvg.glitch.me
|
11 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M01 |
2023-02-22 - 2024-02-01 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2023-05-02 - 2024-05-01 |
a year | crt.sh |
cdn.glitch.global R3 |
2023-08-04 - 2023-11-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://6tyuvg.glitch.me/458je.html
Frame ID: 7CA6E9DBBAAEB9C57C60D405858AE1DE
Requests: 11 HTTP requests in this frame
Screenshot
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Axios (JavaScript libraries) Expand
Detected patterns
- /axios(@|/)([\d.]+)(?:/[a-z]+)?/axios(?:.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 6- https://unpkg.com/axios/dist/axios.min.js HTTP 302
- https://unpkg.com/axios@1.5.0/dist/axios.min.js
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
458je.html
6tyuvg.glitch.me/ |
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
remixicon.css
cdn.jsdelivr.net/npm/remixicon@2.5.0/fonts/ |
108 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.1.3/dist/css/ |
160 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
6tyuvg.glitch.me/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fav.png
cdn.glitch.global/5d305917-a99a-4eeb-b3ed-688b50a8ae7e/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
get.png
cdn.glitch.global/5d305917-a99a-4eeb-b3ed-688b50a8ae7e/ |
5 KB 6 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
to.png
cdn.glitch.global/5d305917-a99a-4eeb-b3ed-688b50a8ae7e/ |
54 KB 54 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
axios.min.js
unpkg.com/axios@1.5.0/dist/ Redirect Chain
|
31 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpeg
cdn.glitch.global/5d305917-a99a-4eeb-b3ed-688b50a8ae7e/ |
161 KB 161 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
red.jpeg
cdn.glitch.global/5d305917-a99a-4eeb-b3ed-688b50a8ae7e/ |
330 B 761 B |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
remixicon.woff2
cdn.jsdelivr.net/npm/remixicon@2.5.0/fonts/ |
122 KB 123 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture string| h object| a object| j function| m object| k number| g number| f string| c string| b function| n function| $ function| jQuery string| herewego function| axios0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
6tyuvg.glitch.me
cdn.glitch.global
cdn.jsdelivr.net
unpkg.com
151.101.194.132
2606:4700::6810:5614
2606:4700::6810:7daf
34.227.137.223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