fuschia-mysterious-mustang.glitch.me Open in urlscan Pro
3.222.50.63  Malicious Activity! Public Scan

URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Submission: On January 17 via api from US — Scanned from DE

Summary

This website contacted 4 IPs in 3 countries across 3 domains to perform 3 HTTP transactions. The main IP is 3.222.50.63, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is fuschia-mysterious-mustang.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M02 on November 3rd 2024. Valid for: a year.
This is the only time fuschia-mysterious-mustang.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Navy Federal Credit Union (Government)

Domain & IP information

IP Address AS Autonomous System
1 3.222.50.63 14618 (AMAZON-AES)
1 104.17.24.14 13335 (CLOUDFLAR...)
1 195.80.159.133 29152 (DECKNET-A...)
3 4
Apex Domain
Subdomains
Transfer
1 l2.io
l2.io — Cisco Umbrella Rank: 217514
229 B
1 cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 218
6 KB
1 glitch.me
fuschia-mysterious-mustang.glitch.me
3 MB
3 3
Domain Requested by
1 l2.io fuschia-mysterious-mustang.glitch.me
1 cdnjs.cloudflare.com fuschia-mysterious-mustang.glitch.me
1 fuschia-mysterious-mustang.glitch.me
3 3

This site contains links to these domains. Also see Links.

Domain
www.navyfederal.org
accountservices.navyfederal.org
Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M02
2024-11-03 -
2025-12-03
a year crt.sh
cdnjs.cloudflare.com
WE1
2024-11-26 -
2025-02-24
3 months crt.sh
l2.io
R11
2024-12-31 -
2025-03-31
3 months crt.sh

This page contains 1 frames:

Primary Page: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Frame ID: EDDD049D0D0D51DF309B9A639C4152EB
Requests: 17 HTTP requests in this frame

Screenshot

Page Title

Navy Federal Credit Union - Our Members are the Mission®

Detected technologies

Overall confidence: 100%
Detected patterns
  • (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

3
Countries

2804 kB
Transfer

2882 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request navyfederal.html
fuschia-mysterious-mustang.glitch.me/public/
3 MB
3 MB
Document
General
Full URL
https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
3.222.50.63 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-222-50-63.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
72fc2944fad326c6b8a1b036d6495ed670e69dac8180ca52c1664f7f62fb5fa1

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
2729034
content-type
text/html; charset=utf-8
date
Fri, 17 Jan 2025 22:53:02 GMT
etag
"32cad8c673f9107e025c3a7c70623416"
last-modified
Thu, 26 Dec 2024 13:55:05 GMT
server
AmazonS3
x-amz-id-2
eSOH26BBBdp5NpCfhCk7Ybh44yQci2eDdSzvDK9bz6zBnItRYJqqQhLkjyqqlxr9YlzdISP8cnUbD0N/P1W7Kx7vsoewNFFfy61tuBVsb+8=
x-amz-request-id
67SGDKQQ34MRGYWM
x-amz-server-side-encryption
AES256
x-amz-version-id
null
font-awesome.min.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/
30 KB
6 KB
Stylesheet
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/font-awesome.min.css
Requested by
Host: fuschia-mysterious-mustang.glitch.me
URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.17.24.14 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://fuschia-mysterious-mustang.glitch.me/

Response headers

cf-cdnjs-via
cfworker/kv
content-encoding
br
cf-cache-status
HIT
etag
"5eb03e5f-7918"
age
783632
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5LycmMZ5X5mfXoEFfRaQUVPimhAyHC2knNCMA3%2F5%2Fvo3IS0ED5dUb3f7h8WI87guYV8OUbWLq4zYH3vGJZL4L%2BMtHPJpnWENpPFEYYaaoP%2FciHJ1ZYFG%2FKMXNG%2FN0VI7W2XjXEZI"}],"group":"cf-nel","max_age":604800}
x-content-type-options
nosniff
expires
Wed, 07 Jan 2026 22:53:04 GMT
alt-svc
h3=":443"; ma=86400
server-timing
cfExtPri
date
Fri, 17 Jan 2025 22:53:04 GMT
content-type
text/css; charset=utf-8
last-modified
Mon, 04 May 2020 16:10:07 GMT
vary
Accept-Encoding
priority
u=0,i=?0
strict-transport-security
max-age=15780000
cache-control
public, max-age=30672000
timing-allow-origin
*
nel
{"success_fraction":0.01,"report_to":"cf-nel","max_age":604800}
cross-origin-resource-policy
cross-origin
cf-ray
9039eb550ed39f28-FRA
accept-ranges
bytes
access-control-allow-origin
*
content-length
5631
server
cloudflare
ip.js
l2.io/
25 B
229 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: fuschia-mysterious-mustang.glitch.me
URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS Decknet SARL, FR),
Reverse DNS
Software
Apache/2.4.59 (Debian) /
Resource Hash
0b357c82b9bf65e965bb94f4297508af905951f21a9da279c30f95cd1cce3cb6

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://fuschia-mysterious-mustang.glitch.me/

Response headers

Keep-Alive
timeout=5, max=100
Content-Length
25
Date
Fri, 17 Jan 2025 22:53:04 GMT
Content-Type
text/html; charset=UTF-8
Server
Apache/2.4.59 (Debian)
Connection
Keep-Alive
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2cca552b4d48760fdce1fb2c0a21e6bf09b6ada1f7e70f5b1f4b7b810367c630

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
21 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3e700f9ff93a023fcaee00daeb83062c9492803afc78643532d41d369133f991

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
16eb10aacb5be4e997453d0d2501d49e7d3a236828ee90f22cd3f913951a6d67

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3c66738cff7fddc343adf5eed0f1ace982866d8beacbd1d699c45ce7cde17d8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
89a821c2c4f26ce58357c1e2fe213e58de98e7a7dd0ddc17e2b3aedeb3a1beae

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
137f34c69c07dd3f6c1caf23bf0611cff6fe684b58ce75b22677abc149643001

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
eac7a5450fce00715e381e02b2359fa4bd7ddd5a30f52e15ca9c342ce24d3b37

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
9 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd0ba3bfcdb6d0b220ce116d51b7317e7e872106601e1d4451fab6f23698d42

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
640 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f7da84eea3d03884fcce20e3c82b7d11f3f0ac91c48b0f57d675ab54e2646ee3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
13 KB
13 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
bc9a16cd945457ad9463cdaed95129b01c589466978dfee3d019d9c604b2171a

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Origin
https://fuschia-mysterious-mustang.glitch.me
Referer

Response headers

Content-Type
font/woff2
truncated
/
13 KB
13 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c124c88ca4fcb4336e97617647ef0d32441329371120c8eabaea0fea226560b0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Origin
https://fuschia-mysterious-mustang.glitch.me
Referer

Response headers

Content-Type
font/woff2
truncated
/
80 KB
80 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
94a271e503aa4ce07fe3c3d06dcd920cf626ea053af0c7a7917879973462e2e3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Origin
https://fuschia-mysterious-mustang.glitch.me
Referer

Response headers

Content-Type
text/plain
truncated
/
23 KB
23 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a8614e2be373b6407e95bca90a8d47ebf7bccb705475a85ee9997ee01ca38133

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Origin
https://fuschia-mysterious-mustang.glitch.me
Referer

Response headers

Content-Type
text/plain
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
83de0b26f5230608c42df74eab660c8e7a51ffe1710ce6c2514bd9c7756b5488

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Navy Federal Credit Union (Government)

8 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 function| savepage_ShadowLoader function| sendp string| userip

0 Cookies

12 Console Messages

Source Level URL
Text
javascript warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
recommendation warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Found 7 elements with non-unique id #akamaiCookieName: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o %o
recommendation warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Found 7 elements with non-unique id #akamaiCookieValue: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o %o
recommendation warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Found 7 elements with non-unique id #hiddenrandom: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o %o
recommendation warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Found 4 elements with non-unique id #password: (More info: https://goo.gl/9p2vKq) %o %o %o %o
recommendation warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Found 8 elements with non-unique id #signIn: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o %o %o
recommendation warning URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Found 11 elements with non-unique id #user: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o %o %o %o %o %o
recommendation verbose URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://fuschia-mysterious-mustang.glitch.me/public/navyfederal.html
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o