shelled-picayune-supermarket.glitch.me
Open in
urlscan Pro
3.222.201.153
Malicious Activity!
Public Scan
Submission: On September 16 via automatic, source openphish — Scanned from DE
Summary
This is the only time shelled-picayune-supermarket.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 | 3.222.201.153 3.222.201.153 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 195.80.159.133 195.80.159.133 | 29152 (DECKNET-AS) (DECKNET-AS) | |
4 | 4 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-3-222-201-153.compute-1.amazonaws.com
shelled-picayune-supermarket.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
1 |
l2.io
l2.io — Cisco Umbrella Rank: 165727 |
230 B |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 209 |
6 KB |
1 |
glitch.me
shelled-picayune-supermarket.glitch.me |
3 MB |
0 |
Failed
function sub() { [native code] }. Failed |
|
4 | 4 |
Domain | Requested by | |
---|---|---|
1 | l2.io |
shelled-picayune-supermarket.glitch.me
|
1 | cdnjs.cloudflare.com |
shelled-picayune-supermarket.glitch.me
|
1 | shelled-picayune-supermarket.glitch.me | |
0 | content-accessible Failed |
srcdoc
|
4 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.navyfederal.org |
accountservices.navyfederal.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-08-03 - 2023-08-02 |
a year | crt.sh |
l2.io R3 |
2022-08-02 - 2022-10-31 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
http://shelled-picayune-supermarket.glitch.me/cqzv.htm?navyfederal_livesecure/info.htm=
Frame ID: 54634FD9A8AD2B0B6553B836D33CE3AD
Requests: 20 HTTP requests in this frame
Frame:
resource://content-accessible/ImageDocument.css
Frame ID: B1C888D95F374EE4F22A338F594B9EEA
Requests: 1 HTTP requests in this frame
Screenshot
Page Title
Navy Federal Credit Union - Our Members are the Mission®Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
13 Outgoing links
These are links going to different origins than the main page.
Title: %7Locations
Search URL Search Domain Scan URL
Title: %2Contact Us
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Sign In Help
Search URL Search Domain Scan URL
Title: Enroll in digital banking »
Search URL Search Domain Scan URL
Title: Learn more »
Search URL Search Domain Scan URL
Title: About Us%8 %8
Search URL Search Domain Scan URL
Title: %8 %8Privacy Policy%8 %8
Search URL Search Domain Scan URL
Title: %8 %8Security%8 %8
Search URL Search Domain Scan URL
Title: %8 %8Accessibility%8 %8
Search URL Search Domain Scan URL
Title: %8 %8Browser Support
Search URL Search Domain Scan URL
Title: Federally Insured by NCUA
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
cqzv.htm
shelled-picayune-supermarket.glitch.me/ |
3 MB 3 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
30 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ip.js
l2.io/ |
26 B 230 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
70 KB 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
91 KB 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
29 KB 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
80 KB 0 |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
640 B 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
ImageDocument.css
content-accessible/ Frame B1C8 |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- content-accessible
- URL
- resource://content-accessible/ImageDocument.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)15 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| 3 object| 4 object| onbeforeinput object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| savepage_ShadowLoader function| sendp string| userip0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
content-accessible
l2.io
shelled-picayune-supermarket.glitch.me
content-accessible
195.80.159.133
2606:4700::6811:180e
3.222.201.153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