boring-gates-a0cb1c.netlify.app
Open in
urlscan Pro
206.189.58.26
Malicious Activity!
Public Scan
Effective URL: https://boring-gates-a0cb1c.netlify.app/alldom.htm
Submission: On October 04 via manual from DE — Scanned from DE
Summary
TLS certificate: Issued by DigiCert TLS Hybrid ECC SHA384 2020 CA1 on March 9th 2021. Valid for: a year.
This is the only time boring-gates-a0cb1c.netlify.app was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Microsoft (Consumer)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.123.16 167.89.123.16 | 11377 (SENDGRID) (SENDGRID) | |
1 | 50.19.254.224 50.19.254.224 | 14618 (AMAZON-AES) (AMAZON-AES) | |
5 | 206.189.58.26 206.189.58.26 | 14061 (DIGITALOC...) (DIGITALOCEAN-ASN) | |
1 | 143.204.98.21 143.204.98.21 | 16509 (AMAZON-02) (AMAZON-02) | |
7 | 3 |
ASN11377 (SENDGRID, US)
PTR: o16789123x16.outbound-mail.sendgrid.net
u23324797.ct.sendgrid.net |
ASN14618 (AMAZON-AES, US)
PTR: ec2-50-19-254-224.compute-1.amazonaws.com
carbonated-luxuriant-maple.glitch.me |
ASN14061 (DIGITALOCEAN-ASN, US)
boring-gates-a0cb1c.netlify.app |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-98-21.fra50.r.cloudfront.net
logo.clearbit.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
netlify.app
boring-gates-a0cb1c.netlify.app |
53 KB |
1 |
clearbit.com
logo.clearbit.com |
3 KB |
1 |
glitch.me
carbonated-luxuriant-maple.glitch.me |
773 B |
1 |
sendgrid.net
1 redirects
u23324797.ct.sendgrid.net |
288 B |
7 | 4 |
Domain | Requested by | |
---|---|---|
5 | boring-gates-a0cb1c.netlify.app |
carbonated-luxuriant-maple.glitch.me
boring-gates-a0cb1c.netlify.app |
1 | logo.clearbit.com |
boring-gates-a0cb1c.netlify.app
|
1 | carbonated-luxuriant-maple.glitch.me | |
1 | u23324797.ct.sendgrid.net | 1 redirects |
7 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2021-01-18 - 2022-02-15 |
a year | crt.sh |
*.netlify.app DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2021-03-09 - 2022-03-01 |
a year | crt.sh |
clearbit.com Amazon |
2021-04-22 - 2022-05-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://boring-gates-a0cb1c.netlify.app/alldom.htm
Frame ID: 832F53C8443B0FA4E2D561D001146855
Requests: 7 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://u23324797.ct.sendgrid.net/ls/click?upn=PBG5whjwAIZofPr9hcHeXIYD3ovgw2RAlTvmoENqMNn-2BQR1WBe4xgkvvA0-2F...
HTTP 302
https://carbonated-luxuriant-maple.glitch.me/oldred.htm Page URL
- https://boring-gates-a0cb1c.netlify.app/alldom.htm Page URL
Detected technologies
Netlify (Web Servers) ExpandDetected patterns
- ^https?://[^/]+\.netlify\.(?:com|app)/
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://u23324797.ct.sendgrid.net/ls/click?upn=PBG5whjwAIZofPr9hcHeXIYD3ovgw2RAlTvmoENqMNn-2BQR1WBe4xgkvvA0-2FO6wcU1ZCSzgAJvWYd0WMrSNFgXnWx6nOifQ2Per0svv16cVuy0Ze1ccC0XY6vKm1OMgrYEtqR_GRFpP-2FTy-2BZdqNxu3hLB7qqEdu2vIYUf3w8H7QAX-2B5zxazf6iPEOQlI6J-2BqjMrbNftTDpMkazUKypxPuzaPKG3fW5guAQHjOYbuJRyugs5CKWU69G3YuZhAI1Q1PB2PP-2FqAcmLBsk1-2BNbsUQFcyhBt3-2Fqr7rcUQCfIMZZFfkjCDxdTMh1vIijzV3d1azSRGYblynXyVBC-2FulFZzMoMikhKGqH78kmKtBpZA7kcgWZ-2FLg-3D
HTTP 302
https://carbonated-luxuriant-maple.glitch.me/oldred.htm Page URL
- https://boring-gates-a0cb1c.netlify.app/alldom.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://u23324797.ct.sendgrid.net/ls/click?upn=PBG5whjwAIZofPr9hcHeXIYD3ovgw2RAlTvmoENqMNn-2BQR1WBe4xgkvvA0-2FO6wcU1ZCSzgAJvWYd0WMrSNFgXnWx6nOifQ2Per0svv16cVuy0Ze1ccC0XY6vKm1OMgrYEtqR_GRFpP-2FTy-2BZdqNxu3hLB7qqEdu2vIYUf3w8H7QAX-2B5zxazf6iPEOQlI6J-2BqjMrbNftTDpMkazUKypxPuzaPKG3fW5guAQHjOYbuJRyugs5CKWU69G3YuZhAI1Q1PB2PP-2FqAcmLBsk1-2BNbsUQFcyhBt3-2Fqr7rcUQCfIMZZFfkjCDxdTMh1vIijzV3d1azSRGYblynXyVBC-2FulFZzMoMikhKGqH78kmKtBpZA7kcgWZ-2FLg-3D HTTP 302
- https://carbonated-luxuriant-maple.glitch.me/oldred.htm
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
oldred.htm
carbonated-luxuriant-maple.glitch.me/ Redirect Chain
|
438 B 773 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
alldom.htm
boring-gates-a0cb1c.netlify.app/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
boring-gates-a0cb1c.netlify.app/ |
3 KB 927 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smiley.gif
boring-gates-a0cb1c.netlify.app/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
arrow_left.svg
boring-gates-a0cb1c.netlify.app/ |
513 B 632 B |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
oerlikon.com
logo.clearbit.com/ |
2 KB 3 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pool.PNG
boring-gates-a0cb1c.netlify.app/ |
47 KB 47 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Microsoft (Consumer)11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect boolean| originAgentCluster string| feedUpdateResponse object| feedUpdateSplit number| x string| che string| em_add string| em_name string| em_domain string| em_name_only string| html_code_for_all_domain_logo0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
boring-gates-a0cb1c.netlify.app
carbonated-luxuriant-maple.glitch.me
logo.clearbit.com
u23324797.ct.sendgrid.net
143.204.98.21
167.89.123.16
206.189.58.26
50.19.254.224
26dcc88c615d3234a871987ae9b834558ee7139d0a9a2dd77dda6db37e14d2c4
34f9db946e89f031a80dfca7b16b2b686469c9886441261ae70a44da1dfa2d58
68dff14c592807b2516d65ce36e5dddef245af9346b0780097797d36b9556d39
77a077645387f31d3c0c823b3f278066b382f4068011ce72e8ca43f68bb28c45
973b70fb5d313112671077d81c12a2f4511669c3b38d7878059497faa47636c6
9ad5de4d4f58a6ded48ca76851d8beaf0cf66a7c2e17106877489b4951a28276
df537b6ae1e6604bf40702c937018c8d7dfc2c2a4baef3a2f0c8f38458b4c7fb