bolivar01.bitbucket.io
Open in
urlscan Pro
2406:da00:ff00::3437:b4cb
Malicious Activity!
Public Scan
Submission: On September 09 via manual from BE — Scanned from DE
Summary
TLS certificate: Issued by DigiCert SHA2 High Assurance Server CA on June 30th 2022. Valid for: a year.
This is the only time bolivar01.bitbucket.io was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Adobe (Consumer) Generic (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 2406:da00:ff0... 2406:da00:ff00::3437:b4cb | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2a00:1450:400... 2a00:1450:4001:80f::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2b | 20446 (STACKPATH...) (STACKPATH-CDN) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:400a:808::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6812:1734 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 34.236.119.172 34.236.119.172 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 | 51.210.32.103 51.210.32.103 | 16276 (OVH) (OVH) | |
4 4 | 13.32.121.15 13.32.121.15 | 16509 (AMAZON-02) (AMAZON-02) | |
4 | 18.66.97.14 18.66.97.14 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700::68... 2606:4700::6811:190e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2606:4700:303... 2606:4700:3032::6815:1e29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
18 | 12 |
ASN14618 (AMAZON-AES, US)
bolivar01.bitbucket.io |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-236-119-172.compute-1.amazonaws.com
few-judicious-radon.glitch.me |
ASN16509 (AMAZON-02, US)
PTR: server-13-32-121-15.fra60.r.cloudfront.net
cdn.glitch.com |
ASN16509 (AMAZON-02, US)
PTR: server-18-66-97-14.fra56.r.cloudfront.net
cdn.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
glitch.me
few-judicious-radon.glitch.me cdn.glitch.me — Cisco Umbrella Rank: 223185 |
120 KB |
4 |
glitch.com
4 redirects
cdn.glitch.com — Cisco Umbrella Rank: 250032 |
2 KB |
3 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 3325 ka-f.fontawesome.com — Cisco Umbrella Rank: 6377 |
22 KB |
2 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 11536 |
27 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1202 |
35 KB |
2 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 976 |
53 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 480 fonts.googleapis.com — Cisco Umbrella Rank: 120 |
31 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 355 |
7 KB |
1 |
bitbucket.io
bolivar01.bitbucket.io |
74 KB |
18 | 9 |
Domain | Requested by | |
---|---|---|
4 | cdn.glitch.me |
bolivar01.bitbucket.io
|
4 | cdn.glitch.com | 4 redirects |
2 | ka-f.fontawesome.com |
kit.fontawesome.com
|
2 | i.ibb.co |
bolivar01.bitbucket.io
|
2 | maxcdn.bootstrapcdn.com |
bolivar01.bitbucket.io
|
2 | code.jquery.com |
bolivar01.bitbucket.io
|
1 | cdnjs.cloudflare.com |
bolivar01.bitbucket.io
|
1 | few-judicious-radon.glitch.me |
bolivar01.bitbucket.io
|
1 | kit.fontawesome.com |
bolivar01.bitbucket.io
|
1 | fonts.googleapis.com |
bolivar01.bitbucket.io
|
1 | ajax.googleapis.com |
bolivar01.bitbucket.io
|
1 | bolivar01.bitbucket.io | |
18 | 12 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bitbucket.io DigiCert SHA2 High Assurance Server CA |
2022-06-30 - 2023-07-05 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-08-22 - 2022-11-14 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2022-08-03 - 2023-07-14 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
*.fontawesome.com DigiCert TLS RSA SHA256 2020 CA1 |
2021-12-01 - 2023-01-01 |
a year | crt.sh |
glitch.com Amazon |
2022-02-01 - 2023-03-02 |
a year | crt.sh |
ibb.co R3 |
2022-08-07 - 2022-11-05 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bolivar01.bitbucket.io/index.html
Frame ID: 9A5F2B0110A1D36956D2EC7CEEA354B0
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Share Point OnlineDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Popper (Miscellaneous) Expand
Detected patterns
- /popper\.js/([0-9.]+)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://cdn.glitch.com/6ca72b66-8609-4328-9f2e-521097041961%2Foffice.png HTTP 301
- https://cdn.glitch.me/6ca72b66-8609-4328-9f2e-521097041961%2Foffice.png
- https://cdn.glitch.com/6ca72b66-8609-4328-9f2e-521097041961%2Foutlook.png HTTP 301
- https://cdn.glitch.me/6ca72b66-8609-4328-9f2e-521097041961%2Foutlook.png
- https://cdn.glitch.com/6ca72b66-8609-4328-9f2e-521097041961%2Fothers.png HTTP 301
- https://cdn.glitch.me/6ca72b66-8609-4328-9f2e-521097041961%2Fothers.png
- https://cdn.glitch.com/f8a250c7-6291-417b-9add-b59b649a403a%2Fgmail-lo.jpg HTTP 301
- https://cdn.glitch.me/f8a250c7-6291-417b-9add-b59b649a403a%2Fgmail-lo.jpg
18 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index.html
bolivar01.bitbucket.io/ |
111 KB 74 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.2.4/ |
84 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.1.1.min.js
code.jquery.com/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/css/ |
141 KB 22 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
398 B 816 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
585b051251.js
kit.fontawesome.com/ |
11 KB 4 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hover.css
few-judicious-radon.glitch.me/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ad.jpg
i.ibb.co/5jLcmNv/ |
4 KB 4 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6ca72b66-8609-4328-9f2e-521097041961%2Foffice.png
cdn.glitch.me/ Redirect Chain
|
29 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6ca72b66-8609-4328-9f2e-521097041961%2Foutlook.png
cdn.glitch.me/ Redirect Chain
|
32 KB 32 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6ca72b66-8609-4328-9f2e-521097041961%2Fothers.png
cdn.glitch.me/ Redirect Chain
|
51 KB 52 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
f8a250c7-6291-417b-9add-b59b649a403a%2Fgmail-lo.jpg
cdn.glitch.me/ Redirect Chain
|
5 KB 6 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.2.1.slim.min.js
code.jquery.com/ |
68 KB 24 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
cdnjs.cloudflare.com/ajax/libs/popper.js/1.12.9/umd/ |
19 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
maxcdn.bootstrapcdn.com/bootstrap/4.0.0/js/ |
48 KB 13 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
59 KB 13 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
free-v4-shims.min.css
ka-f.fontawesome.com/releases/v5.15.4/css/ |
26 KB 5 KB |
Fetch
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
65 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
i.ibb.co/RD3qTKK/ |
23 KB 23 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Adobe (Consumer) Generic (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| $ function| jQuery object| FontAwesomeKitConfig function| Popper object| bootstrap0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000; includeSubDomains; preload |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
bolivar01.bitbucket.io
cdn.glitch.com
cdn.glitch.me
cdnjs.cloudflare.com
code.jquery.com
few-judicious-radon.glitch.me
fonts.googleapis.com
i.ibb.co
ka-f.fontawesome.com
kit.fontawesome.com
maxcdn.bootstrapcdn.com
13.32.121.15
18.66.97.14
2001:4de0:ac18::1:a:2b
2406:da00:ff00::3437:b4cb
2606:4700:3032::6815:1e29
2606:4700::6811:190e
2606:4700::6812:1734
2606:4700::6812:acf
2a00:1450:4001:80f::200a
2a00:1450:400a:808::200a
34.236.119.172
51.210.32.103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