sparkluminaryi.site
Open in
urlscan Pro
172.67.130.59
Malicious Activity!
Public Scan
Effective URL: https://sparkluminaryi.site/
Submission Tags: @hunting_yeth_hounds
Submission: On October 01 via manual from GB — Scanned from GB
Summary
TLS certificate: Issued by WE1 on August 15th 2024. Valid for: 3 months.
This is the only time sparkluminaryi.site was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Community Verdicts: Malicious — 1 votes Show Verdicts
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
4 | 172.67.130.59 172.67.130.59 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bb1f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 104.17.24.14 104.17.24.14 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a02:26f0:470... 2a02:26f0:4700::17d4:6e12 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
10 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
sparkluminaryi.site
sparkluminaryi.site |
5 KB |
3 |
bing.com
th.bing.com — Cisco Umbrella Rank: 163 |
94 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 257 |
173 KB |
1 |
jsdelivr.net
cdn.jsdelivr.net — Cisco Umbrella Rank: 341 |
35 KB |
10 | 4 |
Domain | Requested by | |
---|---|---|
4 | sparkluminaryi.site |
sparkluminaryi.site
|
3 | th.bing.com |
sparkluminaryi.site
|
2 | cdnjs.cloudflare.com |
sparkluminaryi.site
cdnjs.cloudflare.com |
1 | cdn.jsdelivr.net |
sparkluminaryi.site
|
10 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sparkluminaryi.site WE1 |
2024-08-15 - 2024-11-13 |
3 months | crt.sh |
*.jsdelivr.net Sectigo RSA Domain Validation Secure Server CA |
2024-05-04 - 2025-05-04 |
a year | crt.sh |
cdnjs.cloudflare.com WE1 |
2024-09-28 - 2024-12-27 |
3 months | crt.sh |
r.bing.com Microsoft Azure ECC TLS Issuing CA 04 |
2024-06-24 - 2025-06-19 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://sparkluminaryi.site/
Frame ID: 846040AB114304E02567DC4046BDD776
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Vintage Truck Enthusiasts - sparkluminaryi.sitePage URL History Show full URLs
-
http://sparkluminaryi.site/
HTTP 307
https://sparkluminaryi.site/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jsDelivr (CDN) Expand
Detected patterns
- <link [^>]*?href="?[a-zA-Z]*?:?//cdn\.jsdelivr\.net/
- //cdn\.jsdelivr\.net/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://sparkluminaryi.site/
HTTP 307
https://sparkluminaryi.site/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
sparkluminaryi.site/ Redirect Chain
|
7 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
speculation
sparkluminaryi.site/cdn-cgi/ |
128 B 542 B |
Other
application/speculationrules+json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
cdn.jsdelivr.net/npm/bootstrap@5.3.3/dist/css/ |
227 KB 35 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
all.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.0/css/ |
100 KB 19 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OIP.v90Dx_zaDXZ6vHtiorgEagHaEo
th.bing.com/th/id/ |
25 KB 26 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OIP.2VgnHt0v5ED356tLynnpPQHaFj
th.bing.com/th/id/ |
29 KB 29 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
email-decode.min.js
sparkluminaryi.site/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OIP.G6f4MAbwQ5Mc7QT-XsiEqwHaEK
th.bing.com/th/id/ |
39 KB 39 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fa-solid-900.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/6.5.0/webfonts/ |
153 KB 154 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
sparkluminaryi.site/ |
1 KB 1 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Malicious
page.url
Submitted on
October 1st 2024, 12:26:37 pm
UTC —
From United Kingdom
Threats:
Phishing
Comment: Related to the adversary-in-the-middle (AiTM) phishing platform Tycoon.
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.jsdelivr.net
cdnjs.cloudflare.com
sparkluminaryi.site
th.bing.com
104.17.24.14
172.67.130.59
2606:4700::6812:bb1f
2a02:26f0:4700::17d4:6e12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