te-ayudaremos-a-cancelar-lacompra.glitch.me
Open in
urlscan Pro
34.198.68.168
Malicious Activity!
Public Scan
Effective URL: https://te-ayudaremos-a-cancelar-lacompra.glitch.me/
Submission: On August 01 via api from US — Scanned from CA
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time te-ayudaremos-a-cancelar-lacompra.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Bancolombia (Banking)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 34.198.68.168 34.198.68.168 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2607:f8b0:400... 2607:f8b0:400d:c0e::5f | 15169 (GOOGLE) (GOOGLE) | |
1 | 169.45.202.153 169.45.202.153 | 36351 (SOFTLAYER) (SOFTLAYER) | |
1 | 104.26.13.205 104.26.13.205 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 34.117.59.81 34.117.59.81 | 396982 (GOOGLE-CL...) (GOOGLE-CLOUD-PLATFORM) | |
1 | 2607:f8b0:400... 2607:f8b0:400d:c02::5f | 15169 (GOOGLE) (GOOGLE) | |
12 | 7 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-198-68-168.compute-1.amazonaws.com
te-ayudaremos-a-cancelar-lacompra.glitch.me |
ASN36351 (SOFTLAYER, US)
PTR: 99.ca.2da9.ip4.static.sl-reverse.com
www.bancolombia.com |
ASN396982 (GOOGLE-CLOUD-PLATFORM, US)
PTR: 81.59.117.34.bc.googleusercontent.com
ipinfo.io |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
glitch.me
te-ayudaremos-a-cancelar-lacompra.glitch.me |
109 KB |
2 |
googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 641 fonts.googleapis.com — Cisco Umbrella Rank: 110 |
32 KB |
1 |
ipinfo.io
ipinfo.io — Cisco Umbrella Rank: 5710 |
488 B |
1 |
ipify.org
api.ipify.org — Cisco Umbrella Rank: 2512 |
157 B |
1 |
bancolombia.com
www.bancolombia.com — Cisco Umbrella Rank: 202409 |
56 KB |
0 |
sirv.com
Failed
ocastant.sirv.com Failed |
|
12 | 6 |
Domain | Requested by | |
---|---|---|
6 | te-ayudaremos-a-cancelar-lacompra.glitch.me |
te-ayudaremos-a-cancelar-lacompra.glitch.me
|
1 | fonts.googleapis.com |
te-ayudaremos-a-cancelar-lacompra.glitch.me
|
1 | ipinfo.io |
ajax.googleapis.com
|
1 | api.ipify.org |
ajax.googleapis.com
|
1 | www.bancolombia.com |
te-ayudaremos-a-cancelar-lacompra.glitch.me
|
1 | ajax.googleapis.com |
te-ayudaremos-a-cancelar-lacompra.glitch.me
|
0 | ocastant.sirv.com Failed |
te-ayudaremos-a-cancelar-lacompra.glitch.me
|
12 | 7 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
upload.video.google.com WR2 |
2024-07-30 - 2024-10-22 |
3 months | crt.sh |
www.bancolombia.com GlobalSign Extended Validation CA - SHA256 - G3 |
2024-03-21 - 2025-04-22 |
a year | crt.sh |
ipify.org WE1 |
2024-07-18 - 2024-10-16 |
3 months | crt.sh |
ipinfo.io R10 |
2024-07-03 - 2024-10-01 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://te-ayudaremos-a-cancelar-lacompra.glitch.me/
Frame ID: 803C7124C4F57B8223DE5953E2DD1637
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
HomePage URL History Show full URLs
-
http://te-ayudaremos-a-cancelar-lacompra.glitch.me/
HTTP 307
https://te-ayudaremos-a-cancelar-lacompra.glitch.me/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://te-ayudaremos-a-cancelar-lacompra.glitch.me/
HTTP 307
https://te-ayudaremos-a-cancelar-lacompra.glitch.me/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
te-ayudaremos-a-cancelar-lacompra.glitch.me/ Redirect Chain
|
3 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
te-ayudaremos-a-cancelar-lacompra.glitch.me/ |
0 339 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
util.css
te-ayudaremos-a-cancelar-lacompra.glitch.me/ |
82 KB 82 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.css
te-ayudaremos-a-cancelar-lacompra.glitch.me/ |
13 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/ |
87 KB 31 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo-grupo-bancolombia.png
www.bancolombia.com/wcm/connect/www.bancolombia.com-26918/08749bce-7395-4b19-b23c-e7fd93047a0a/ |
43 KB 56 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
saxes.js
te-ayudaremos-a-cancelar-lacompra.glitch.me/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
api.ipify.org/ |
24 B 157 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
ipinfo.io/ |
294 B 488 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
images.png
ocastant.sirv.com/dunkin/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
737 B 783 B |
Font
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
te-ayudaremos-a-cancelar-lacompra.glitch.me/ |
4 KB 4 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ocastant.sirv.com
- URL
- https://ocastant.sirv.com/dunkin/images.png
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Bancolombia (Banking)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery string| telegram_bot_id string| chat_id function| ready function| sender function| ready1 function| sender1 function| ready2 function| sender2 function| ready3 function| sender30 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
9 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
api.ipify.org
fonts.googleapis.com
ipinfo.io
ocastant.sirv.com
te-ayudaremos-a-cancelar-lacompra.glitch.me
www.bancolombia.com
ocastant.sirv.com
104.26.13.205
169.45.202.153
2607:f8b0:400d:c02::5f
2607:f8b0:400d:c0e::5f
34.117.59.81
34.198.68.168
1b1a6330b6fca87ae58bdd0b005d870f5a43f0b8774cebb271cf9fcfe6613bd8
2784f6ffefbd5fcae302d112e1629907deed1e36f9c2050ea6d7038eec3f649c
5a03ffcd505e4a9382fe09f194f64c564c0adf05eee975ee24100313b18a3769
977b2ba617c26fc931319de6265247ebb115a6a53ca7f720405ab73b1783b48b
a3342c0b527353adb540c0c3569c703cce24091d23ab7deb2209098e151f23a9
b5d9c6ccc6f8719760801dd385bb455e4f16537d5ac17f2059ca0702383677e2
b955cc66cff77d38ce4b963927bbf6d7ecca3607ca47a1e3392176f2d2dad0f1
d42963d04775f09b1f7834b7fc62019aca171c718b81f5b895ccafa44b20fcda
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f6a1bf1a2feaa4d348eacdab000520448ecc3cf6dc1a806985b4a5c49dbff036
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d