dandelion-determined-building.glitch.me
Open in
urlscan Pro
18.232.248.31
Malicious Activity!
Public Scan
Effective URL: https://dandelion-determined-building.glitch.me/public/NF6ZYO3U0ETRC6UIA5BRREAKTD8CH9OENR.html
Submission: On October 18 via api from US — Scanned from ES
Summary
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time dandelion-determined-building.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 185.209.61.33 185.209.61.33 | 12338 (EUSKALTEL) (EUSKALTEL) | |
1 | 18.232.248.31 18.232.248.31 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 195.80.159.133 195.80.159.133 | 29152 (DECKNET-AS) (DECKNET-AS) | |
1 | 162.19.58.159 162.19.58.159 | 16276 (OVH) (OVH) | |
5 | 5 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-18-232-248-31.compute-1.amazonaws.com
dandelion-determined-building.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
vitalsad.com
vitalsad.com |
2 KB |
1 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 12145 |
3 KB |
1 |
l2.io
l2.io — Cisco Umbrella Rank: 167770 |
231 B |
1 |
glitch.me
dandelion-determined-building.glitch.me |
3 MB |
5 | 4 |
Domain | Requested by | |
---|---|---|
2 | vitalsad.com | |
1 | i.ibb.co |
dandelion-determined-building.glitch.me
|
1 | l2.io |
dandelion-determined-building.glitch.me
|
1 | dandelion-determined-building.glitch.me | |
5 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.navyfederal.org |
accountservices.navyfederal.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
vitalsad.com Sectigo RSA Domain Validation Secure Server CA |
2024-01-11 - 2025-01-11 |
a year | crt.sh |
glitch.com Amazon RSA 2048 M03 |
2023-12-04 - 2025-01-01 |
a year | crt.sh |
l2.io R10 |
2024-09-02 - 2024-12-01 |
3 months | crt.sh |
ibb.co E5 |
2024-08-22 - 2024-11-20 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://dandelion-determined-building.glitch.me/public/NF6ZYO3U0ETRC6UIA5BRREAKTD8CH9OENR.html
Frame ID: F86598175ED982F9F14437445AA3D80A
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Navy Federal Credit Union - Our Members are the Mission®Page URL History Show full URLs
- https://vitalsad.com/xmlrpc/xtpl/ Page URL
- https://dandelion-determined-building.glitch.me/public/NF6ZYO3U0ETRC6UIA5BRREAKTD8CH9OENR.html Page URL
Page Statistics
13 Outgoing links
These are links going to different origins than the main page.
Title: æ37Locations
Search URL Search Domain Scan URL
Title: æ32Contact Us
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Sign In Help
Search URL Search Domain Scan URL
Title: Enroll in digital banking »
Search URL Search Domain Scan URL
Title: Learn more »
Search URL Search Domain Scan URL
Title: About Us 08 08
Search URL Search Domain Scan URL
Title: 08 08Privacy Policy 08 08
Search URL Search Domain Scan URL
Title: 08 08Security 08 08
Search URL Search Domain Scan URL
Title: 08 08Accessibility 08 08
Search URL Search Domain Scan URL
Title: 08 08Browser Support
Search URL Search Domain Scan URL
Title: Federally Insured by NCUA
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://vitalsad.com/xmlrpc/xtpl/ Page URL
- https://dandelion-determined-building.glitch.me/public/NF6ZYO3U0ETRC6UIA5BRREAKTD8CH9OENR.html Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
vitalsad.com/xmlrpc/xtpl/ |
398 B 418 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
NF6ZYO3U0ETRC6UIA5BRREAKTD8CH9OENR.html
dandelion-determined-building.glitch.me/public/ |
3 MB 3 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
vitalsad.com/ |
1 KB 1 KB |
Other
image/vnd.microsoft.icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ip.js
l2.io/ |
27 B 231 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ajax-loader.gif
i.ibb.co/RpLNy4f/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
80 KB 80 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
181 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| 3 object| 4 function| savepage_ShadowLoader object| _cs function| _f0 function| sendEmail string| chat_id string| bot_token function| sendEmailo function| sendEmaili function| sendEmailii function| switchVisiblee90 function| sendEmailiii function| sendEmailiiii string| userip0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
8 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=15768000; includeSubDomains |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dandelion-determined-building.glitch.me
i.ibb.co
l2.io
vitalsad.com
162.19.58.159
18.232.248.31
185.209.61.33
195.80.159.133
137f34c69c07dd3f6c1caf23bf0611cff6fe684b58ce75b22677abc149643001
16eb10aacb5be4e997453d0d2501d49e7d3a236828ee90f22cd3f913951a6d67
2cca552b4d48760fdce1fb2c0a21e6bf09b6ada1f7e70f5b1f4b7b810367c630
3dfd67346cada4803a7011a1945da66cae907ba33b8c3b9b1c7d631ce5d023c5
3e700f9ff93a023fcaee00daeb83062c9492803afc78643532d41d369133f991
83de0b26f5230608c42df74eab660c8e7a51ffe1710ce6c2514bd9c7756b5488
89a821c2c4f26ce58357c1e2fe213e58de98e7a7dd0ddc17e2b3aedeb3a1beae
8cad81119ca977df103e7646cf54f6fc247cf83762353eb034cafa9788ad87b2
94a271e503aa4ce07fe3c3d06dcd920cf626ea053af0c7a7917879973462e2e3
a8614e2be373b6407e95bca90a8d47ebf7bccb705475a85ee9997ee01ca38133
a9950fa5ca9cf47072770900d259bcf6778aa1119652d2e706d5eb92df254199
abd0ba3bfcdb6d0b220ce116d51b7317e7e872106601e1d4451fab6f23698d42
bd76316e856a1dc408f21cb531bfd7a74c3475b01a0ddc34b446fbc2a322c7b4
d3c66738cff7fddc343adf5eed0f1ace982866d8beacbd1d699c45ce7cde17d8
eac7a5450fce00715e381e02b2359fa4bd7ddd5a30f52e15ca9c342ce24d3b37
ee4321efb356cf875dacf07419eb2649351e5907c159754a94b7b3be02479fe9
efb3cdc5e4582fd67dffab6fc6e5062074ce3f8c51747346af944e97749dc309
fd29b3b084cf11160bfc4e99d98a261f2b36bff29113b07367c5204563c5d355