incongruous-abrasive-thief.glitch.me Open in urlscan Pro
54.237.41.217  Malicious Activity! Public Scan

Submitted URL: http://tgbe.ws/ugxhcz
Effective URL: https://incongruous-abrasive-thief.glitch.me/?=162jutia162
Submission: On March 12 via manual from FR

Summary

This website contacted 4 IPs in 1 countries across 4 domains to perform 3 HTTP transactions. The main IP is 54.237.41.217, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is incongruous-abrasive-thief.glitch.me.
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time incongruous-abrasive-thief.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
2 2 2606:4700:303... 13335 (CLOUDFLAR...)
1 54.237.41.217 14618 (AMAZON-AES)
1 64.20.38.219 19318 (IS-AS-1)
1 67.202.94.94 32748 (STEADFAST)
3 4
Apex Domain
Subdomains
Transfer
2 tgbe.ws
tgbe.ws
1 KB
1 amung.us
whos.amung.us
29 B
1 mega-scripts.cyou
mega-scripts.cyou
94 KB
1 glitch.me
incongruous-abrasive-thief.glitch.me
789 B
3 4
Domain Requested by
2 tgbe.ws 2 redirects
1 whos.amung.us incongruous-abrasive-thief.glitch.me
1 mega-scripts.cyou incongruous-abrasive-thief.glitch.me
1 incongruous-abrasive-thief.glitch.me
3 4

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2021-01-18 -
2022-02-15
a year crt.sh
wh858580.ispot.cc
cPanel, Inc. Certification Authority
2021-02-26 -
2021-05-27
3 months crt.sh
whos.amung.us
Sectigo RSA Domain Validation Secure Server CA
2020-05-21 -
2022-05-21
2 years crt.sh

This page contains 1 frames:

Primary Page: https://incongruous-abrasive-thief.glitch.me/?=162jutia162
Frame ID: B83C365ACF27DE60BF7BAB9B5D739E28
Requests: 5 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://tgbe.ws/ugxhcz HTTP 301
    https://tgbe.ws/ugxhcz HTTP 302
    https://incongruous-abrasive-thief.glitch.me/?=162jutia162 Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Overall confidence: 100%
Detected patterns
  • headers server /^AmazonS3$/i

Page Statistics

3
Requests

100 %
HTTPS

25 %
IPv6

4
Domains

4
Subdomains

4
IPs

1
Countries

95 kB
Transfer

292 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://tgbe.ws/ugxhcz HTTP 301
    https://tgbe.ws/ugxhcz HTTP 302
    https://incongruous-abrasive-thief.glitch.me/?=162jutia162 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
incongruous-abrasive-thief.glitch.me/
Redirect Chain
  • http://tgbe.ws/ugxhcz
  • https://tgbe.ws/ugxhcz
  • https://incongruous-abrasive-thief.glitch.me/?=162jutia162
454 B
789 B
Document
General
Full URL
https://incongruous-abrasive-thief.glitch.me/?=162jutia162
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.237.41.217 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-237-41-217.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
b789aa79769e026ffdcb2ea4e778959282b77b1540c186994b2b0b5eb8b0e6dc

Request headers

:method
GET
:authority
incongruous-abrasive-thief.glitch.me
:scheme
https
:path
/?=162jutia162
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 12 Mar 2021 22:11:10 GMT
content-type
text/html; charset=utf-8
content-length
454
x-amz-id-2
FabdV4YY6QF5baupVt/CbZm/ZHUB01Iew6MHLtcTu5UCJLLVBWzXQ/NhZdRZGtiM4kVD5O1YZn0=
x-amz-request-id
YA1BGXSSJAZESRTM
last-modified
Fri, 12 Mar 2021 14:39:29 GMT
etag
"797734fea52d79e09d32764c524cb8c3"
cache-control
no-cache
x-amz-version-id
nJa1w4cekXjhWIq39CNv7IurW6NMjBML
accept-ranges
bytes
server
AmazonS3

Redirect headers

date
Fri, 12 Mar 2021 22:11:10 GMT
content-type
text/html; charset=UTF-8
set-cookie
__cfduid=ddcf4bbcd8723084bbe7811f1048887b31615587070; expires=Sun, 11-Apr-21 22:11:10 GMT; path=/; domain=.tgbe.ws; HttpOnly; SameSite=Lax; Secure
x-frame-options
SAMEORIGIN
location
https://incongruous-abrasive-thief.glitch.me?=162jutia162
cache-control
max-age=172800
expires
Sun, 14 Mar 2021 22:11:10 GMT
x-xss-protection
1; mode=block
x-content-type-options
nosniff
x-content-security-policy
allow 'self';
cf-cache-status
DYNAMIC
cf-request-id
08ca17696c00004e443b23b000000001
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
report-to
{"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=kv5V%2BJSFgaRHm3kh68L%2B%2Bx8xIqfYwGeddodPam9QzsIYSkXUznOvEYlcgxb6%2BT%2B17updhPruQRXgJW1gUlz1pY6Wy1TyGuP%2BQ8env6JW0qHx40UR"}]}
nel
{"report_to":"cf-nel","max_age":604800}
server
cloudflare
cf-ray
62f05b5579724e44-FRA
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
/
mega-scripts.cyou/
239 KB
94 KB
Script
General
Full URL
https://mega-scripts.cyou/?token=722504ba1e86863f4a782869a9d2db24
Requested by
Host: incongruous-abrasive-thief.glitch.me
URL: https://incongruous-abrasive-thief.glitch.me/?=162jutia162
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
64.20.38.219 , United States, ASN19318 (IS-AS-1, US),
Reverse DNS
Software
LiteSpeed /
Resource Hash
e8c997adcfc200b39e40b2e3d185f9a93b42f1d53f912de2de6d61a01171cdcf

Request headers

Referer
https://incongruous-abrasive-thief.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Fri, 12 Mar 2021 22:11:11 GMT
content-encoding
br
server
LiteSpeed
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
cache-control
no-store, no-cache, must-revalidate, max-age=0, post-check=0, pre-check=0
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
/
whos.amung.us/pingjs/
29 B
29 B
Image
General
Full URL
https://whos.amung.us/pingjs/?k=jcbsasa01&t=Blacksar%20Inc.&x=https://whos.amung.us/&y=https://whos.amung.us/&a=-1&d=0&v=27&r=6502
Requested by
Host: incongruous-abrasive-thief.glitch.me
URL: https://incongruous-abrasive-thief.glitch.me/?=162jutia162
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
67.202.94.94 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
amung.us
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://incongruous-abrasive-thief.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Fri, 12 Mar 2021 22:11:11 GMT
content-encoding
gzip
content-type
text/javascript;charset=UTF-8
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
51 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

18 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated string| d object| dom string| back boolean| ignoreHistoryChange boolean| ignoreHashChange string| kon object| _$_f395 string| head string| bod

0 Cookies