daffy-accessible-galliform.glitch.me Open in urlscan Pro
34.202.189.75  Malicious Activity! Public Scan

URL: https://daffy-accessible-galliform.glitch.me/public/zemem.HTM
Submission: On March 20 via api from US — Scanned from US

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 34.202.189.75, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is daffy-accessible-galliform.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time daffy-accessible-galliform.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Nationwide Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 34.202.189.75 14618 (AMAZON-AES)
1 195.80.159.133 29152 (DECKNET-AS)
2 3
Apex Domain
Subdomains
Transfer
1 l2.io
l2.io — Cisco Umbrella Rank: 292385
227 B
1 glitch.me
daffy-accessible-galliform.glitch.me
831 KB
2 2
Domain Requested by
1 l2.io daffy-accessible-galliform.glitch.me
1 daffy-accessible-galliform.glitch.me
2 2
Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M03
2023-12-04 -
2025-01-01
a year crt.sh
l2.io
R3
2024-03-05 -
2024-06-03
3 months crt.sh

This page contains 1 frames:

Primary Page: https://daffy-accessible-galliform.glitch.me/public/zemem.HTM
Frame ID: 87A1CD58FE34358D7EA19DD49091DEA2
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

Internet Bank | Login | Nationwide

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

1058 kB
Transfer

1134 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request zemem.HTM
daffy-accessible-galliform.glitch.me/public/
829 KB
831 KB
Document
General
Full URL
https://daffy-accessible-galliform.glitch.me/public/zemem.HTM
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.202.189.75 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-202-189-75.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
590d65eaef8ef02772816925868c0961b94213ced0b8952bdadd90905ca628bb

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
849159
content-type
text/html; charset=utf-8
date
Wed, 20 Mar 2024 14:03:23 GMT
etag
"c25828a14a30290fa1652ffa4e30cbd4"
last-modified
Wed, 20 Mar 2024 06:04:34 GMT
server
AmazonS3
x-amz-id-2
iO9oxO6YxQnQNr3M7W3sZnIFysyiox/uWLB7bdbDNHcnnouSrCa2bikYh5ZH5Md8+KHYoEviKw4=
x-amz-request-id
EZ63A19K2THD2WE5
x-amz-server-side-encryption
AES256
x-amz-version-id
null
ip.js
l2.io/
23 B
227 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: daffy-accessible-galliform.glitch.me
URL: https://daffy-accessible-galliform.glitch.me/public/zemem.HTM
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS, FR),
Reverse DNS
Software
Apache/2.4.38 (Debian) /
Resource Hash
8e91107a6fedb480c4abca6ab165aae5d045bfc51c2511952dab9c0b81eb83df

Request headers

Referer
https://daffy-accessible-galliform.glitch.me/
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Wed, 20 Mar 2024 14:03:24 GMT
Server
Apache/2.4.38 (Debian)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
23
Content-Type
text/html; charset=UTF-8
truncated
/
73 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1179a312fd24a1546386f94b7c744562e65bd1ef8eea12d7d1f4f234289f3bad

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
892ef25d857dbb17c3310310338578e0e19772646435a540fdc717b47979b13b

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
33 KB
33 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
154f369084c28c7ceaf71531663e84382b0f3ac78fffa7f91c4543499b8ee41b

Request headers

Referer
Origin
https://daffy-accessible-galliform.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
application/octet-stream
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f06722cdec025dcab10f4fab41dfd79ffe6a8888d7c7a9ce5efeb86a1170a38b

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ac07fbf105019336ea0feec19e3ea9ec28557b2748de0a790be3213884bff45c

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
161 KB
161 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c01ee414cef757dfcd67619395a9d6dac513d6eb9fe9baa8d70402d13b2a4647

Request headers

Referer
Origin
https://daffy-accessible-galliform.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
application/octet-stream
truncated
/
32 KB
32 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5cfc1d72a6c4c817544222468ad1a2f27ed404481f529f223c05c1c52bb3ba2c

Request headers

Referer
Origin
https://daffy-accessible-galliform.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

Content-Type
application/octet-stream

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Nationwide Bank (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader string| userip function| isNumber

0 Cookies

2 Console Messages

Source Level URL
Text
javascript warning URL: https://daffy-accessible-galliform.glitch.me/public/zemem.HTM
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://daffy-accessible-galliform.glitch.me/public/zemem.HTM
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.