woolen-telling-leopon.glitch.me
Open in
urlscan Pro
54.224.168.88
Malicious Activity!
Public Scan
Effective URL: https://woolen-telling-leopon.glitch.me/index2.html
Submission: On June 30 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time woolen-telling-leopon.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Frontier (Telecommunication)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 54.224.168.88 54.224.168.88 | 14618 (AMAZON-AES) (AMAZON-AES) | |
6 | 108.181.20.37 108.181.20.37 | 40676 (AS40676) (AS40676) | |
1 | 104.26.12.205 104.26.12.205 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 199.224.64.214 199.224.64.214 | 3593 (FRONTIER-...) (FRONTIER-EPIX) | |
19 | 5 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-54-224-168-88.compute-1.amazonaws.com
woolen-telling-leopon.glitch.me |
ASN3593 (FRONTIER-EPIX, US)
PTR: login.dlls.pa.frontiernet.net
login.frontier.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
catbox.moe
files.catbox.moe — Cisco Umbrella Rank: 160519 |
31 KB |
2 |
frontier.com
login.frontier.com — Cisco Umbrella Rank: 668125 |
2 KB |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2418 |
166 B |
1 |
glitch.me
woolen-telling-leopon.glitch.me |
143 KB |
19 | 4 |
Domain | Requested by | |
---|---|---|
6 | files.catbox.moe |
woolen-telling-leopon.glitch.me
files.catbox.moe |
2 | login.frontier.com | |
1 | api.ipify.org |
woolen-telling-leopon.glitch.me
|
1 | woolen-telling-leopon.glitch.me | |
19 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
*.catbox.moe R3 |
2024-05-29 - 2024-08-27 |
3 months | crt.sh |
ipify.org GTS CA 1P5 |
2024-05-19 - 2024-08-17 |
3 months | crt.sh |
*.frontier.com Entrust Certification Authority - L1K |
2023-06-20 - 2024-07-13 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://woolen-telling-leopon.glitch.me/index2.html
Frame ID: 7574A69E142BEE97C87A32DBC27AECCF
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
Frontier Mail LoginPage URL History Show full URLs
-
http://woolen-telling-leopon.glitch.me/index2.html
HTTP 307
https://woolen-telling-leopon.glitch.me/index2.html Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://woolen-telling-leopon.glitch.me/index2.html
HTTP 307
https://woolen-telling-leopon.glitch.me/index2.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
19 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
index2.html
woolen-telling-leopon.glitch.me/ Redirect Chain
|
142 KB 143 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9f4xrp.css
files.catbox.moe/ |
119 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2ep6wt.css
files.catbox.moe/ |
23 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
05qpu8.css
files.catbox.moe/ |
5 KB 949 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
9vias1.css
files.catbox.moe/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sir4zv.css
files.catbox.moe/ |
293 B 641 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ru69bf.css
files.catbox.moe/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
42 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
31 B 166 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.woff2
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.woff2
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.woff2
files.catbox.moe/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.woff
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.woff
files.catbox.moe/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.woff
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Regular.ttf
files.catbox.moe/PPObjectSansRegular/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.ttf
files.catbox.moe/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
PPObjectSans-Bold.ttf
files.catbox.moe/PPObjectSansBold/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.svg
login.frontier.com/ftr-sys-theme/img/ |
1 KB 2 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.svg
login.frontier.com/ftr-sys-theme/img/ |
1 KB 0 |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.woff2
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.woff2
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/fonts/fontawesome-webfont.woff2?v=4.3.0
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.woff
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/fonts/fontawesome-webfont.woff?v=4.3.0
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.woff
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansRegular/PPObjectSans-Regular.ttf
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/fonts/fontawesome-webfont.ttf?v=4.3.0
- Domain
- files.catbox.moe
- URL
- https://files.catbox.moe/PPObjectSansBold/PPObjectSans-Bold.ttf
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Frontier (Telecommunication)5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| submit_login function| getIP0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
18 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
api.ipify.org
files.catbox.moe
login.frontier.com
woolen-telling-leopon.glitch.me
files.catbox.moe
104.26.12.205
108.181.20.37
199.224.64.214
54.224.168.88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