bubbly-incredible-roadrunner.glitch.me
Open in
urlscan Pro
34.234.46.6
Malicious Activity!
Public Scan
Effective URL: https://bubbly-incredible-roadrunner.glitch.me/
Submission: On December 27 via api from BY — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 3rd 2024. Valid for: a year.
This is the only time bubbly-incredible-roadrunner.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bancolombia (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 34.234.46.6 34.234.46.6 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 185.199.111.153 185.199.111.153 | 54113 (FASTLY) (FASTLY) | |
1 | 142.250.181.234 142.250.181.234 | 15169 (GOOGLE) (GOOGLE) | |
1 | 172.217.18.10 172.217.18.10 | 15169 (GOOGLE) (GOOGLE) | |
1 | 162.55.133.184 162.55.133.184 | 24940 (HETZNER-A...) (HETZNER-AS Hetzner Online GmbH) | |
1 | 172.64.147.188 172.64.147.188 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.202.1 104.17.202.1 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.67.74.152 172.67.74.152 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 34.117.59.81 34.117.59.81 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
2 | 142.250.186.35 142.250.186.35 | 15169 (GOOGLE) (GOOGLE) | |
15 | 10 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-234-46-6.compute-1.amazonaws.com
bubbly-incredible-roadrunner.glitch.me |
ASN54113 (FASTLY, US)
PTR: cdn-185-199-111-153.github.com
necolas.github.io |
ASN15169 (GOOGLE, US)
PTR: fra16s56-in-f10.1e100.net
fonts.googleapis.com |
ASN15169 (GOOGLE, US)
PTR: fra24s22-in-f10.1e100.net
ajax.googleapis.com |
ASN24940 (HETZNER-AS Hetzner Online GmbH, DE)
PTR: static.184.133.55.162.clients.your-server.de
sapp2406.sirv.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 81.59.117.34.bc.googleusercontent.com
ipinfo.io |
ASN15169 (GOOGLE, US)
PTR: fra24s04-in-f3.1e100.net
fonts.gstatic.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
glitch.me
bubbly-incredible-roadrunner.glitch.me |
17 KB |
2 |
gstatic.com
fonts.gstatic.com |
36 KB |
2 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 ajax.googleapis.com — Cisco Umbrella Rank: 415 |
32 KB |
1 |
ipinfo.io
ipinfo.io — Cisco Umbrella Rank: 7599 |
498 B |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2001 |
315 B |
1 |
cloudinary.com
res.cloudinary.com — Cisco Umbrella Rank: 2559 |
19 KB |
1 |
fontawesome.com
kit.fontawesome.com — Cisco Umbrella Rank: 2020 |
|
1 |
sirv.com
sapp2406.sirv.com |
2 KB |
1 |
github.io
necolas.github.io — Cisco Umbrella Rank: 165817 |
2 KB |
15 | 9 |
Domain | Requested by | |
---|---|---|
5 | bubbly-incredible-roadrunner.glitch.me |
bubbly-incredible-roadrunner.glitch.me
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | ipinfo.io |
ajax.googleapis.com
|
1 | api.ipify.org |
ajax.googleapis.com
|
1 | res.cloudinary.com |
bubbly-incredible-roadrunner.glitch.me
|
1 | kit.fontawesome.com |
bubbly-incredible-roadrunner.glitch.me
|
1 | sapp2406.sirv.com |
bubbly-incredible-roadrunner.glitch.me
|
1 | ajax.googleapis.com |
bubbly-incredible-roadrunner.glitch.me
|
1 | fonts.googleapis.com |
bubbly-incredible-roadrunner.glitch.me
|
1 | necolas.github.io |
bubbly-incredible-roadrunner.glitch.me
|
15 | 10 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M02 |
2024-11-03 - 2025-12-03 |
a year | crt.sh |
*.github.io DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-03-15 - 2025-03-14 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-12-02 - 2025-02-24 |
3 months | crt.sh |
*.sirv.com Sectigo RSA Domain Validation Secure Server CA |
2024-11-07 - 2025-12-08 |
a year | crt.sh |
*.fontawesome.com DigiCert Global G2 TLS RSA SHA256 2020 CA1 |
2024-07-30 - 2025-01-27 |
6 months | crt.sh |
*.cloudinary.com Go Daddy Secure Certificate Authority - G2 |
2024-04-23 - 2025-05-25 |
a year | crt.sh |
ipify.org WE1 |
2024-11-13 - 2025-02-11 |
3 months | crt.sh |
ipinfo.io R11 |
2024-11-15 - 2025-02-13 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-12-02 - 2025-02-24 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bubbly-incredible-roadrunner.glitch.me/
Frame ID: BC47458EFEBDE74A157852C17E952AF0
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
CANCELAR COMPRAPage URL History Show full URLs
-
http://bubbly-incredible-roadrunner.glitch.me/
HTTP 307
https://bubbly-incredible-roadrunner.glitch.me/ Page URL
Detected technologies
Cloudinary (CDN) ExpandDetected patterns
- <img[^>]+\.cloudinary\.com
Font Awesome (Font Scripts) Expand
Detected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- kit\.fontawesome\.com/([0-9a-z]+).js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bubbly-incredible-roadrunner.glitch.me/
HTTP 307
https://bubbly-incredible-roadrunner.glitch.me/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bubbly-incredible-roadrunner.glitch.me/ Redirect Chain
|
4 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
normalize.css
necolas.github.io/normalize.css/8.0.1/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
5 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
estilos.css
bubbly-incredible-roadrunner.glitch.me/ |
3 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.svg
sapp2406.sirv.com/bansombia/ |
6 KB 2 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
formulario.js
bubbly-incredible-roadrunner.glitch.me/ |
2 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2c36e9b7b1.js
kit.fontawesome.com/ |
0 0 |
Script
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Captura_de_pantalla_2024-12-13_110329_hfagxb.png
res.cloudinary.com/df0dkfksy/image/upload/v1734108504/ |
18 KB 19 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
22 B 315 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ipinfo.io/ |
310 B 498 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
14.svg
bubbly-incredible-roadrunner.glitch.me/ |
4 KB 4 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v32/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
bubbly-incredible-roadrunner.glitch.me/ |
4 KB 4 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bancolombia (Banking)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| telegram_bot_id string| chat_id function| ready function| sender0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
api.ipify.org
bubbly-incredible-roadrunner.glitch.me
fonts.googleapis.com
fonts.gstatic.com
ipinfo.io
kit.fontawesome.com
necolas.github.io
res.cloudinary.com
sapp2406.sirv.com
104.17.202.1
142.250.181.234
142.250.186.35
162.55.133.184
172.217.18.10
172.64.147.188
172.67.74.152
185.199.111.153
34.117.59.81
34.234.46.6
2784f6ffefbd5fcae302d112e1629907deed1e36f9c2050ea6d7038eec3f649c
2d4cac0f02700952eee70726706b976b274192b7f9a6319455f90b135fb48e1b
406c282fe9ba51a86c1e3a691969dedba15a95379e83ea88fb673103d3cbcea8
580818700724d42d7fcc4979b0197971fca1c6d2e0286769237a0ac897df5512
6822aedc4df8da5f8c533140def4da003af4ab3d721cf2f3667cd3bc4465e4e6
89978e658e840b927dddb5cb3a835c7d8526ece79933bd9f3096b301fe1a8571
965026dfb3a74b271865387948ca4025861d1246db9d9b3924a84aa7637f688d
c3e3d7e0bce6022ae66381d04eb4742252d577ba15c5f9cceb49cb14c9eb90b1
c9fda5146268cc37b2ccbe29959d83deb3055436ab5d7d8a2dd19d95a3ea0e4a
d9bada3a44bb2ffa66dec5cc781cafc9ef17ed876cd9b0c5f7ef18228b63cebb
e3ced14d7f2fe7e9c013589bdfb84dbe148256097eb800b9d67a84e396e19194
ef89c23a41dd684ca178b7dd9a522e5a3857bd95023e9ed616e5634474473548
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d