cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net
Open in
urlscan Pro
162.244.80.76
Malicious Activity!
Public Scan
Effective URL: https://cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net/?_kx=vTIPy2K0mY5ynYi-htrNCPhQFCkzF14ihGKH0x1jZ_4=.RGBj4d
Submission: On September 14 via manual from US — Scanned from US
Summary
TLS certificate: Issued by R3 on September 13th 2022. Valid for: 3 months.
This is the only time cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Email (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 34.197.184.213 34.197.184.213 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 1 | 44.241.215.139 44.241.215.139 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 52.20.125.168 52.20.125.168 | 14618 (AMAZON-AES) (AMAZON-AES) | |
2 | 162.244.80.76 162.244.80.76 | 19624 (SERVERROOM) (SERVERROOM) | |
1 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:824::2008 | 15169 (GOOGLE) (GOOGLE) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:80f::200a | 15169 (GOOGLE) (GOOGLE) | |
3 | 2600:9000:251... 2600:9000:2514:6200:8:22e4:b000:93a1 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 23.78.193.167 23.78.193.167 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 2 | 99.84.37.52 99.84.37.52 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 13.35.93.37 13.35.93.37 | 16509 (AMAZON-02) (AMAZON-02) | |
12 | 10 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-197-184-213.compute-1.amazonaws.com
linklock.titanhq.com |
ASN16509 (AMAZON-02, US)
PTR: ec2-44-241-215-139.us-west-2.compute.amazonaws.com
clt1473608.bmetrack.com |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-20-125-168.compute-1.amazonaws.com
prairie-bristle-penguin.glitch.me |
ASN19624 (SERVERROOM, US)
PTR: mangdomeng.com
cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net |
ASN15169 (GOOGLE, US)
www.googletagmanager.com |
ASN16509 (AMAZON-02, US)
d12y7sg0iam4lc.cloudfront.net |
ASN16625 (AKAMAI-AS, US)
PTR: a23-78-193-167.deploy.static.akamaitechnologies.com
appleid.cdn-apple.com |
ASN16509 (AMAZON-02, US)
PTR: server-99-84-37-52.ewr52.r.cloudfront.net
logo.clearbit.com |
ASN16509 (AMAZON-02, US)
PTR: server-13-35-93-37.jfk50.r.cloudfront.net
image.thum.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
cloudfront.net
d12y7sg0iam4lc.cloudfront.net |
|
2 |
clearbit.com
1 redirects
logo.clearbit.com — Cisco Umbrella Rank: 41794 |
2 KB |
2 |
siasky.net
cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net |
25 KB |
1 |
thum.io
image.thum.io — Cisco Umbrella Rank: 285472 |
|
1 |
cdn-apple.com
appleid.cdn-apple.com — Cisco Umbrella Rank: 4546 |
17 KB |
1 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 480 |
31 KB |
1 |
googletagmanager.com
www.googletagmanager.com — Cisco Umbrella Rank: 141 |
43 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3281 |
25 KB |
1 |
glitch.me
prairie-bristle-penguin.glitch.me |
733 B |
1 |
bmetrack.com
1 redirects
clt1473608.bmetrack.com |
299 B |
1 |
titanhq.com
1 redirects
linklock.titanhq.com — Cisco Umbrella Rank: 586005 |
457 B |
12 | 11 |
Domain | Requested by | |
---|---|---|
3 | d12y7sg0iam4lc.cloudfront.net |
prairie-bristle-penguin.glitch.me
|
2 | logo.clearbit.com | 1 redirects |
2 | cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net |
prairie-bristle-penguin.glitch.me
cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net |
1 | image.thum.io | |
1 | appleid.cdn-apple.com |
prairie-bristle-penguin.glitch.me
|
1 | ajax.googleapis.com |
prairie-bristle-penguin.glitch.me
|
1 | www.googletagmanager.com |
prairie-bristle-penguin.glitch.me
|
1 | stackpath.bootstrapcdn.com |
prairie-bristle-penguin.glitch.me
|
1 | prairie-bristle-penguin.glitch.me | |
1 | clt1473608.bmetrack.com | 1 redirects |
1 | linklock.titanhq.com | 1 redirects |
12 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2022-02-01 - 2023-03-02 |
a year | crt.sh |
siasky.net R3 |
2022-09-13 - 2022-12-12 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
*.google-analytics.com GTS CA 1C3 |
2022-08-22 - 2022-11-14 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-08-22 - 2022-11-14 |
3 months | crt.sh |
*.cloudfront.net Amazon |
2022-02-01 - 2023-01-31 |
a year | crt.sh |
appleid.cdn-apple.com Apple Public EV Server RSA CA 2 - G1 |
2022-04-19 - 2023-05-19 |
a year | crt.sh |
thum.io Amazon |
2021-11-07 - 2022-12-05 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net/?_kx=vTIPy2K0mY5ynYi-htrNCPhQFCkzF14ihGKH0x1jZ_4=.RGBj4d
Frame ID: 942105B870ADC616399AAE1DF48AD6A1
Requests: 13 HTTP requests in this frame
Screenshot
Page Title
SmithPage URL History Show full URLs
-
https://linklock.titanhq.com/analyse?url=https%3A%2F%2Fclt1473608.bmetrack.com%2Fc%2Fl%3Fu%3DE561124%26e%...
HTTP 302
https://clt1473608.bmetrack.com/c/l?u=E561124&e=14F8FA0&c=167C48&t=1&l=88EF6F5D&email=Kae3%2FRyTmxApncCLaGKu... HTTP 302
https://prairie-bristle-penguin.glitch.me/?utm_source=BenchmarkEmail&utm_campaign=Sep_14_2022_Email&utm_medium=email Page URL
- https://cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net/?_kx=vTIPy2K0mY5ynYi-htrNCPhQFCkzF14ihGKH0x1jZ_4=.RGBj4d Page URL
Detected technologies
Apple Sign-in (Social logins) ExpandDetected patterns
- appleid\.auth\.js
Bootstrap (Web Frameworks) Expand
Detected patterns
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Tag Manager (Tag Managers) Expand
Detected patterns
- googletagmanager\.com/gtag/js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://linklock.titanhq.com/analyse?url=https%3A%2F%2Fclt1473608.bmetrack.com%2Fc%2Fl%3Fu%3DE561124%26e%3D14F8FA0%26c%3D167C48%26t%3D1%26l%3D88EF6F5D%26email%3DKae3%252FRyTmxApncCLaGKuifrcFmca7AiI%26seq%3D1%23Y29udGFjdEBzbWl0aC5jbw%3D%3D&data=eJw9jM1ugzAQhJ_GHCP_Qw8cKOCoSk9VpahHsxhBikkCdpP06btWq0qzWn07MwulZnZQnQRKucqzvtz8FMYdnDNfhlu9fB0fq7_eY7b9OeNKJI2LC2AHhzmfrSWcl2AhoPHfjuUYwmUjoiLcoGAOTOZC02LXeRdWC5-pnBycmQgTiWhapRnjknDtkJg0hakoEiTSeS0LhJAAN5aaomiNNqpJDW-ndDpYJwhX3Lw93v29uixQv9r9IU7DCsaDzavpBeObu_7-ER_8KfZ7c-rb5-_uOFNbq1N3QxP1A4LlVok%
HTTP 302
https://clt1473608.bmetrack.com/c/l?u=E561124&e=14F8FA0&c=167C48&t=1&l=88EF6F5D&email=Kae3%2FRyTmxApncCLaGKuifrcFmca7AiI&seq=1 HTTP 302
https://prairie-bristle-penguin.glitch.me/?utm_source=BenchmarkEmail&utm_campaign=Sep_14_2022_Email&utm_medium=email Page URL
- https://cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net/?_kx=vTIPy2K0mY5ynYi-htrNCPhQFCkzF14ihGKH0x1jZ_4=.RGBj4d Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://linklock.titanhq.com/analyse?url=https%3A%2F%2Fclt1473608.bmetrack.com%2Fc%2Fl%3Fu%3DE561124%26e%3D14F8FA0%26c%3D167C48%26t%3D1%26l%3D88EF6F5D%26email%3DKae3%252FRyTmxApncCLaGKuifrcFmca7AiI%26seq%3D1%23Y29udGFjdEBzbWl0aC5jbw%3D%3D&data=eJw9jM1ugzAQhJ_GHCP_Qw8cKOCoSk9VpahHsxhBikkCdpP06btWq0qzWn07MwulZnZQnQRKucqzvtz8FMYdnDNfhlu9fB0fq7_eY7b9OeNKJI2LC2AHhzmfrSWcl2AhoPHfjuUYwmUjoiLcoGAOTOZC02LXeRdWC5-pnBycmQgTiWhapRnjknDtkJg0hakoEiTSeS0LhJAAN5aaomiNNqpJDW-ndDpYJwhX3Lw93v29uixQv9r9IU7DCsaDzavpBeObu_7-ER_8KfZ7c-rb5-_uOFNbq1N3QxP1A4LlVok% HTTP 302
- https://clt1473608.bmetrack.com/c/l?u=E561124&e=14F8FA0&c=167C48&t=1&l=88EF6F5D&email=Kae3%2FRyTmxApncCLaGKuifrcFmca7AiI&seq=1 HTTP 302
- https://prairie-bristle-penguin.glitch.me/?utm_source=BenchmarkEmail&utm_campaign=Sep_14_2022_Email&utm_medium=email
- https://logo.clearbit.com/https://smith.co HTTP 301
- https://logo.clearbit.com/https:/smith.co
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
prairie-bristle-penguin.glitch.me/ Redirect Chain
|
553 B 733 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net/ |
56 KB 25 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
stackpath.bootstrapcdn.com/bootstrap/4.5.2/css/ |
157 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
js
www.googletagmanager.com/gtag/ |
109 KB 43 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.6.0/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mesg_en.js
d12y7sg0iam4lc.cloudfront.net/b1268/s/js/ |
0 0 |
Script
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pack.min.js
d12y7sg0iam4lc.cloudfront.net/b1268/s/js/ |
0 0 |
Script
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
appleid.auth.js
appleid.cdn-apple.com/appleauth/static/jsapi/appleid/1/en_US/ |
42 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
authen.min.js
d12y7sg0iam4lc.cloudfront.net/b1268/s/js/ |
0 0 |
Script
application/xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers |
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg-image.jpg
cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net/img/ |
70 B 70 B |
Image
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smith.co
logo.clearbit.com/https:/ Redirect Chain
|
947 B 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
smith.co
image.thum.io/get/width/1200/https:// |
57 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Email (Online)16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation function| dF function| $ function| jQuery object| google_tag_manager object| dataLayer object| AppleID2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
linklock.titanhq.com/ | Name: cp_locale Value: en |
|
.bmetrack.com/ | Name: ASP.NET_SessionId Value: 3wz1ewkz3fj5wd1homclzylk |
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
appleid.cdn-apple.com
cg08br49q099imepkosgq3bucdcg0qvl4ageu1s3sc2uens6o3pvmeo.siasky.net
clt1473608.bmetrack.com
d12y7sg0iam4lc.cloudfront.net
image.thum.io
linklock.titanhq.com
logo.clearbit.com
prairie-bristle-penguin.glitch.me
stackpath.bootstrapcdn.com
www.googletagmanager.com
13.35.93.37
162.244.80.76
23.78.193.167
2600:9000:2514:6200:8:22e4:b000:93a1
2606:4700::6812:acf
2607:f8b0:4006:80f::200a
2607:f8b0:4006:824::2008
34.197.184.213
44.241.215.139
52.20.125.168
99.84.37.52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