blush-ruddy-environment.glitch.me/public/omaza.html
52.2.151.71200 OK 63 kB URL User Request GET HTTP/2 blush-ruddy-environment.glitch.me/public/omaza.html
IP 52.2.151.71:443
Certificate IssuerAmazon
Subjectglitch.com
Fingerprint13:93:2D:E4:50:7E:CE:BA:BC:F9:6D:7E:86:7F:43:5D:8E:63:45:3E
ValidityWed, 22 Feb 2023 00:00:00 GMT - Thu, 01 Feb 2024 23:59:59 GMT
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document, Unicode text, UTF-8 text, with very long lines (26579)
Hash 37dca1194bb17cb34e33d4bfeec1b6dd
bb284e676d88b9c4689c97ae4f751c3e83295cae
f27518244a657ef2cc17662531692005e6efd4831bfeb7461e8b88d7bcf7338c
Analyzer Verdict Alert OpenPhish phishing NatWest Personal Banking
GET /public/omaza.html HTTP/1.1
Host: blush-ruddy-environment.glitch.me
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Thu, 16 Nov 2023 13:49:09 GMT
content-type: text/html; charset=utf-8
content-length: 62989
x-amz-id-2: LQ+bXtOP76axwRGJbQCw6RrHohHE14mWrKkK5FGXIZTRDfGvU1YTk2nC8671soaegHldOknnUFE=
x-amz-request-id: BPYMG7ZP45612CG0
last-modified: Thu, 16 Nov 2023 05:42:39 GMT
etag: "37dca1194bb17cb34e33d4bfeec1b6dd"
x-amz-server-side-encryption: AES256
cache-control: no-cache
x-amz-version-id: null
accept-ranges: bytes
server: AmazonS3
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/plogo.png
213.180.193.247200 OK 5.7 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/plogo.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 80 x 106, 8-bit/color RGBA, non-interlaced\012- data
Hash cce808c0c23f731523eb4b7298ad18d8
e7e040afc91e194b3241653aab4863bf20020014
f2b557317fb851b3ed73c2d8203192e9ed433bd006ca5025ccb3317ef15e1b8d
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /plogo.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: image/png
content-length: 5679
accept-ranges: bytes
etag: "cce808c0c23f731523eb4b7298ad18d8"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: a8b9fc0c26bc83a3
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/error-marker.png
213.180.193.247200 OK 1.1 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/error-marker.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 29 x 29, 8-bit/color RGBA, non-interlaced\012- data
Hash 50f1540b40bf348f927c3ed21aba72b3
b8c94013139462b49a2422ba947a7a8fede3552e
27f324f2ad60091d5e8f76adfef83f9122dc8aa8df29d0a8d970bfe06aaa5005
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /error-marker.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: image/png
content-length: 1090
accept-ranges: bytes
etag: "50f1540b40bf348f927c3ed21aba72b3"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: b1c1793c383d7fe4
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/favicon.ico
213.180.193.247200 OK 2.2 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/favicon.ico
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type MS Windows icon resource - 1 icon, 32x32, 8 bits/pixel\012- data
Hash d0ab1861f850d4514edaa1696b3b5ce2
8fbdfef1335ccf858072297caef21e1925a44d11
9bbf91204e8022d01c859c92c1d9218ac4859de521548856534b48ac2e7849a8
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /favicon.ico HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:11 GMT
content-type: image/x-icon
content-length: 2238
accept-ranges: bytes
etag: "d0ab1861f850d4514edaa1696b3b5ce2"
last-modified: Mon, 04 Sep 2023 09:44:18 GMT
x-amz-request-id: 6ec74fb3287b8cba
X-Firefox-Spdy: h2
l2.io/ip.js?var=userip
195.80.159.133200 OK 24 B IP 195.80.159.133:443
ASN #29152 Decknet S.a.r.l.
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerLet's Encrypt
Subjectl2.io
Fingerprint65:49:ED:2D:E9:35:D9:26:3D:70:87:2B:4F:20:FF:14:56:55:52:B4
ValidityTue, 17 Oct 2023 07:33:55 GMT - Mon, 15 Jan 2024 07:33:54 GMT
File type ASCII text, with no line terminators
Hash f9dc91b3feea65bd389a2f5b57306c32
147d1c9ae79ae948a34c5f1254bdcbf7af9caf8e
d88923af30873abcf4cde709062c3d2e9ded181f9e2552c7fbcc983b3796ff77
GET /ip.js?var=userip HTTP/1.1
Host: l2.io
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Date: Thu, 16 Nov 2023 13:49:12 GMT
Server: Apache/2.4.38 (Debian)
Content-Length: 24
Keep-Alive: timeout=5, max=100
Connection: Keep-Alive
Content-Type: text/html; charset=UTF-8
eclipse.website.yandexcloud.net/check-box.png
213.180.193.247200 OK 157 B URL GET HTTP/2 eclipse.website.yandexcloud.net/check-box.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced\012- data
Hash b23db76451b3df600c7dbda6c93a2e2e
a2054da2c842bf4f5651c4ee1481688e215a56bf
d2955b58d801a021737f025d1716a68fd2a143ddac3e0b749fcc053deba6e082
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /check-box.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/npc.css
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: image/png
content-length: 157
accept-ranges: bytes
etag: "b23db76451b3df600c7dbda6c93a2e2e"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 30316c3ac9205334
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/li5_outer_frame_top_curve.gif
213.180.193.247200 OK 18 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/li5_outer_frame_top_curve.gif
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- HTML document text\012- exported SGML document text\012- exported SGML document, Unicode text, UTF-8 text, with very long lines (1543), with CRLF line terminators
Hash b5f90335c1b50c6e46292060d68662bc
35054541ed3c9a873ded0200644a9304eb85fb68
a9525f33d124699e204c65d7711a4cfb074db510e171a0f03ae17b60226bfd75
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /li5_outer_frame_top_curve.gif HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/master.css
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: image/gif
content-length: 17540
accept-ranges: bytes
etag: "b5f90335c1b50c6e46292060d68662bc"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 027c156919f81264
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/radio-selected.png
213.180.193.247200 OK 1.6 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/radio-selected.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 32 x 32, 8-bit/color RGBA, interlaced\012- data
Hash 2ac5b52fbdb0be1bbc9506a24f78afe9
bd049c00ea03ed4e6eefaed6fb9744ee48839f58
d81db57832f4742b67755f90f8c3d37735cb9f58dbb10e312f931343d27552c6
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /radio-selected.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/npc.css
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: image/png
content-length: 1633
accept-ranges: bytes
etag: "2ac5b52fbdb0be1bbc9506a24f78afe9"
last-modified: Mon, 04 Sep 2023 09:44:20 GMT
x-amz-request-id: face846fcb896c64
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/down-chevron.png
213.180.193.247200 OK 295 B URL GET HTTP/2 eclipse.website.yandexcloud.net/down-chevron.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 13 x 8, 8-bit/color RGBA, non-interlaced\012- data
Hash 5d1201e574de6bb2d10db83ade0d098d
b28bb6abd4cf048f7cebe0ee459c3511c0a22df7
4f5a022467e927b5b385cc335e58434a49bad0520ed018fc059075069d695c79
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /down-chevron.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/npc.css
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: image/png
content-length: 295
accept-ranges: bytes
etag: "5d1201e574de6bb2d10db83ade0d098d"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 79fbdc080fcac134
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/white-lock.png
213.180.193.247200 OK 285 B URL GET HTTP/2 eclipse.website.yandexcloud.net/white-lock.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 18 x 22, 8-bit/color RGBA, non-interlaced\012- data
Hash 4a3360fb538fcc33db66e22afbd18715
112eca49dcfede70854283a7c51fba6e8a96a4df
b465d00b89619e9899ec7d618559157db09f935d318466d67deb036157fadcf2
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /white-lock.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/npc.css
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: image/png
content-length: 285
accept-ranges: bytes
etag: "4a3360fb538fcc33db66e22afbd18715"
last-modified: Mon, 04 Sep 2023 09:44:20 GMT
x-amz-request-id: 31676c6a7c8bc5ba
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/combined-shape.png
213.180.193.247200 OK 359 B URL GET HTTP/2 eclipse.website.yandexcloud.net/combined-shape.png
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type PNG image data, 13 x 13, 8-bit/color RGBA, non-interlaced\012- data
Hash 3d738a237a2dd5f3075939942052d472
9ccba64b7bcd8a7949b3afbcfa0d76a7bf47618e
d1c878b4e69d9da5292c53b1f46708de74c435144895bdfd697208406466a814
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /combined-shape.png HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/npc.css
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: image/png
content-length: 359
accept-ranges: bytes
etag: "3d738a237a2dd5f3075939942052d472"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 9057ce5fae9e8700
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/RNHouseSansW05-Regular.woff2
213.180.193.247200 OK 22 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/RNHouseSansW05-Regular.woff2
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type Web Open Font Format (Version 2), TrueType, length 21572, version 1.65\012- data
Hash 4b04fa8e8cb9b74a12575a0fd3e8f1ac
2f58dcbfc01528ef4b4c7e395dde7ba3ea738cef
9be8b2c42ad2d6f7327f62a7d03995a5a4615770154941d59493473186e5140c
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /RNHouseSansW05-Regular.woff2 HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://blush-ruddy-environment.glitch.me
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: application/x-www-form-urlencoded
content-length: 21572
accept-ranges: bytes
etag: "4b04fa8e8cb9b74a12575a0fd3e8f1ac"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 579338d58746758b
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/RNHouseSansW05-Bold.woff2
213.180.193.247200 OK 22 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/RNHouseSansW05-Bold.woff2
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type Web Open Font Format (Version 2), TrueType, length 22184, version 1.65\012- data
Hash d81e0cfa15c3c638984cc484bf9a23fd
fb4ee0e7f1c3d9b6737304a70aeeb52c05d6ae1d
ce64c0d35d4ad8fd2fa79ecd45d6db37982940958b7f51448b697bad342ce55b
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /RNHouseSansW05-Bold.woff2 HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://blush-ruddy-environment.glitch.me
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: application/x-www-form-urlencoded
content-length: 22184
accept-ranges: bytes
etag: "d81e0cfa15c3c638984cc484bf9a23fd"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: b9d85447d35a079f
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/RNHouseSansW05-Regular.woff
213.180.193.247404 Not Found 225 B URL GET HTTP/2 eclipse.website.yandexcloud.net/RNHouseSansW05-Regular.woff
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type HTML document text\012- HTML document text\012- HTML document, ASCII text
Hash 69af5c9405b82257d3ecd8da12a9b443
4ec601b3b228d00a4b292c04af8a83efc564b272
681490fc94cd7cf6e0aa2c3837bf881bcba8a8c1d9142f20464ae45d76ceba1e
GET /RNHouseSansW05-Regular.woff HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://blush-ruddy-environment.glitch.me
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 404 Not Found
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: text/html; charset=utf-8
content-length: 225
x-amz-request-id: 6b1192f5e8bb508b
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/RNHouseSansW05-Bold.woff
213.180.193.247404 Not Found 225 B URL GET HTTP/2 eclipse.website.yandexcloud.net/RNHouseSansW05-Bold.woff
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type HTML document text\012- HTML document text\012- HTML document, ASCII text
Hash bdc01fef6db212fab842a33fb88ca5ae
5b1e2fc328d86102c09634b5ade3a2610d209d85
4a73a580826a933e743828171affbc1bdf08286840d835fd1026af8dd1b3382a
GET /RNHouseSansW05-Bold.woff HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: identity
Origin: https://blush-ruddy-environment.glitch.me
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 404 Not Found
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: text/html; charset=utf-8
content-length: 225
x-amz-request-id: 2048c2e7762c384c
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/main.css
213.180.193.247200 OK 2.3 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/main.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with very long lines (2467), with no line terminators
Hash d27c908c0a0f4f7a2f4c3d9eab1eda9d
d919bdabb3c2594cf3d5fabc5738c0455f45a96d
e7bafd4ef8552124ce79b315cad6ad90072f4c9ec56d580988b433b940579ff3
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /main.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"0c357b809e35163ef98bb273e7e3e587"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 1d65677fd3ddc50c
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/RNHouseSansW05-Regular.ttf
213.180.193.247404 Not Found 225 B URL GET HTTP/2 eclipse.website.yandexcloud.net/RNHouseSansW05-Regular.ttf
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type HTML document text\012- HTML document text\012- HTML document, ASCII text, with no line terminators
Hash 52b2eea224c4b03eefa6bd7a5a8d2205
c92b9435d32a5338e0e1d4eff86bc39c1677144e
d1a27f93cbc4cca98208ecf9dde340015bd579a6a0927adf73f176928559b13b
GET /RNHouseSansW05-Regular.ttf HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: https://blush-ruddy-environment.glitch.me
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 404 Not Found
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: text/html; charset=utf-8
x-amz-request-id: c79bcdcf3938b734
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/master.css
213.180.193.247200 OK 229 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/master.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
Size 229 kB (228718 bytes)
Hash d41d8cd98f00b204e9800998ecf8427e
da39a3ee5e6b4b0d3255bfef95601890afd80709
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
GET /master.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"2dfd733f065ca6d2369a67ef4983a29c"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: e8ba8c2a36df5e81
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/panel-defaults.css
213.180.193.247200 OK 9.5 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/panel-defaults.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with very long lines (10026), with no line terminators
Hash 2b13243b436c7b2bdab97a00d0bdc83e
b77a0b552752683c04911ae0a7ccc2ccd160e3e8
ab9a95d180845122008f01470e4c504eea345aeaae2b56810e5f5da80ae1764f
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /panel-defaults.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"e909d59f350c1dad51b78325b5953eb2"
last-modified: Mon, 04 Sep 2023 09:44:18 GMT
x-amz-request-id: 8042909b12305571
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/RNHouseSansW05-Bold.ttf
213.180.193.247404 Not Found 225 B URL GET HTTP/2 eclipse.website.yandexcloud.net/RNHouseSansW05-Bold.ttf
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type HTML document text\012- HTML document text\012- HTML document, ASCII text, with no line terminators
Hash b270f24cb99c56263cdf2a344cdcef84
8043bd69896accab3f421b098740d4cd50912979
ff8c64c623eca080b1238f1a7b0a4ac3fee7f1192e1c16c0234593d223edae34
GET /RNHouseSansW05-Bold.ttf HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: application/font-woff2;q=1.0,application/font-woff;q=0.9,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Origin: https://blush-ruddy-environment.glitch.me
DNT: 1
Connection: keep-alive
Referer: https://eclipse.website.yandexcloud.net/
Sec-Fetch-Dest: font
Sec-Fetch-Mode: cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 404 Not Found
server: nginx
date: Thu, 16 Nov 2023 13:49:12 GMT
content-type: text/html; charset=utf-8
x-amz-request-id: 5c0ec00c29880537
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/jquery-2.2.3.js
213.180.193.247200 OK 259 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/jquery-2.2.3.js
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
Size 259 kB (258648 bytes)
Hash aacc43d6f308fa362ac85e3f4fb2b30c
09b2fbec3c6e662be486da501a913d4b93ad39eb
95a5d6b46c9da70a89f0903e5fdc769a2c266a22a19fcb5598e5448a044db4fe
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /jquery-2.2.3.js HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/javascript
etag: W/"aacc43d6f308fa362ac85e3f4fb2b30c"
last-modified: Mon, 04 Sep 2023 09:44:18 GMT
x-amz-request-id: d5b2f112cb738707
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/master_mobile.css
213.180.193.247200 OK 48 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/master_mobile.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with very long lines (417), with CRLF line terminators
Hash 5cc6a870d1a1dd62dc2690ea17b7e3c4
a35f3def4a047fa6a97b3add6ca760d4c2ebb318
762a7161fafb519ada43534e1e4aa7fd8f5ae402d21cdbb3aff8ff569b29ad6a
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /master_mobile.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"5cc6a870d1a1dd62dc2690ea17b7e3c4"
last-modified: Mon, 04 Sep 2023 09:44:18 GMT
x-amz-request-id: e69d3e56702e02f9
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/font-awesome.css
213.180.193.247200 OK 22 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/font-awesome.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with very long lines (21777)
Hash b3f38f8786407280c4585f1586bf26ee
0315cd1680136ba95453dd922167063ba3e83df1
043d64ad39164b2b6d031cbaf82d44542b3904b814ffb4ae9738f0953e32f143
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /font-awesome.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"b3f38f8786407280c4585f1586bf26ee"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: c9e49dd56e73c98a
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/npc.css
213.180.193.247200 OK 47 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/npc.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with very long lines (518), with CRLF line terminators
Hash d3f76cb5e9a68a590459b54b35e2ac59
97db38040f44843b6ee5caac758acb6b5d6fb921
b618b1630fe11a6fee0232601cc91ac7e7cd56ec8d4ab7353846e493d8764778
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /npc.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"d3f76cb5e9a68a590459b54b35e2ac59"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: 1b9537ed51e3fabc
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/n-w-logo.svg
213.180.193.247200 OK 4.9 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/n-w-logo.svg
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type SVG Scalable Vector Graphics image\012- , ASCII text, with very long lines (5130), with no line terminators
Hash 38a645866bc3e70134037a82f4fe09dc
abd02684532197dfbf3aeb7a516a9cf10144f318
95741274755d42aeb33855bc5d24092c708d58907f5bbb1e45799aacf38d7c4d
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /n-w-logo.svg HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: image/svg+xml
etag: W/"987cc7771f2fe14e61de62bd92e2411e"
last-modified: Mon, 04 Sep 2023 09:44:18 GMT
x-amz-request-id: cadb6318ac137124
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/overlayPromptMaster.css
213.180.193.247200 OK 1.4 kB URL GET HTTP/2 eclipse.website.yandexcloud.net/overlayPromptMaster.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with very long lines (1433), with no line terminators
Hash fb29db1ccb5595033c04c41e41970ff7
3a2f704e6c8344224c35293aa35afb884cab0fb7
d97ad5adb79bfd3bc7e87caecd5d144b21102a2e619ae660319ff1d389dc5ebd
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /overlayPromptMaster.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"1e4c183b3f098d3bca4ccce20c428912"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: ea3a147cbee1ed0a
content-encoding: gzip
X-Firefox-Spdy: h2
eclipse.website.yandexcloud.net/overlayPrompt.css
213.180.193.247200 OK 76 B URL GET HTTP/2 eclipse.website.yandexcloud.net/overlayPrompt.css
IP 213.180.193.247:443
Requested by https://blush-ruddy-environment.glitch.me/public/omaza.html
Certificate IssuerGlobalSign nv-sa
Subject*.storage.yandexcloud.net
FingerprintCF:A1:D6:D8:81:FD:C9:B6:37:A0:BD:9B:43:3E:43:F5:88:A4:78:2F
ValidityMon, 11 Sep 2023 08:52:31 GMT - Fri, 12 Apr 2024 08:52:31 GMT
File type ASCII text, with no line terminators
Hash 29ac62190c59652415f3a6d0fdbf49c2
64a45fa68138c6eca867a94f61c6d8af16266ab4
dc167ac9ffb4e52df7c93e3fbcb4a261faf325636194a3ed80218814492fd620
Analyzer Verdict Alert urlquery phishing Phishing - NatWest
GET /overlayPrompt.css HTTP/1.1
Host: eclipse.website.yandexcloud.net
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:109.0) Gecko/20100101 Firefox/111.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://blush-ruddy-environment.glitch.me/
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
server: nginx
date: Thu, 16 Nov 2023 13:49:10 GMT
content-type: text/css
etag: W/"82a1b6373fa17d314053cb7173954338"
last-modified: Mon, 04 Sep 2023 09:44:19 GMT
x-amz-request-id: c8a2b769e54eac4e
content-encoding: gzip
X-Firefox-Spdy: h2