quark-airy-chef.glitch.me Open in urlscan Pro
54.162.72.13  Malicious Activity! Public Scan

URL: https://quark-airy-chef.glitch.me/fast.html
Submission: On October 01 via api from JP — Scanned from JP

Summary

This website contacted 4 IPs in 2 countries across 4 domains to perform 4 HTTP transactions. The main IP is 54.162.72.13, located in United States and belongs to AMAZON-AES, US. The main domain is quark-airy-chef.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M01 on February 22nd 2023. Valid for: a year.
This is the only time quark-airy-chef.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Coinbase (Crypto Exchange)

Domain & IP information

IP Address AS Autonomous System
1 54.162.72.13 14618 (AMAZON-AES)
1 2404:6800:400... 15169 (GOOGLE)
1 104.238.220.140 23470 (RELIABLESITE)
1 2404:6800:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
1 gstatic.com
fonts.gstatic.com
19 KB
1 postimg.cc
i.postimg.cc — Cisco Umbrella Rank: 16361
5 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 113
1 KB
1 glitch.me
quark-airy-chef.glitch.me
4 KB
4 4
Domain Requested by
1 fonts.gstatic.com fonts.googleapis.com
1 i.postimg.cc quark-airy-chef.glitch.me
1 fonts.googleapis.com quark-airy-chef.glitch.me
1 quark-airy-chef.glitch.me
4 4

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M01
2023-02-22 -
2024-02-01
a year crt.sh
upload.video.google.com
GTS CA 1C3
2023-09-04 -
2023-11-27
3 months crt.sh
postimg.cc
R3
2023-08-23 -
2023-11-21
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2023-09-04 -
2023-11-27
3 months crt.sh

This page contains 1 frames:

Primary Page: https://quark-airy-chef.glitch.me/fast.html
Frame ID: 10D281F076F43FBF6F66474B4C283D43
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

info

Page Statistics

4
Requests

100 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

4
IPs

2
Countries

29 kB
Transfer

29 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request fast.html
quark-airy-chef.glitch.me/
4 KB
4 KB
Document
General
Full URL
https://quark-airy-chef.glitch.me/fast.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.162.72.13 , United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-162-72-13.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
18ddc9976dc8868e11135d12c717a44c10e3728a2ed80fa7bc0b6eb731753062

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36
accept-language
jp-JP,jp;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
3675
content-type
text/html; charset=utf-8
date
Sun, 01 Oct 2023 17:33:44 GMT
etag
"e19f23059bb36dd1a1176958f12b2fbd"
last-modified
Wed, 20 Sep 2023 13:48:38 GMT
server
AmazonS3
x-amz-id-2
zG6i0TG6pXZWaa8VkQkJeuxSOY0YiozG8toGwdrk4SRBGJyll9Ndgd/wrSKVbSCzFkeUZZXoQG0=
x-amz-request-id
CT4E6Z5MC8AK387W
x-amz-server-side-encryption
AES256
x-amz-version-id
PR2RmeCwqF29VizAlL5CVb1smLgIfR7s
css
fonts.googleapis.com/
3 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans
Requested by
Host: quark-airy-chef.glitch.me
URL: https://quark-airy-chef.glitch.me/fast.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:818::200a , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
4ddf6973fa3421cc10d8946187a761c0317632b66442c3d20c736024fba1029f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://quark-airy-chef.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Sun, 01 Oct 2023 17:33:44 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Sun, 01 Oct 2023 17:09:14 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sun, 01 Oct 2023 17:33:44 GMT
copad.png
i.postimg.cc/gjDmNRkh/
5 KB
5 KB
Image
General
Full URL
https://i.postimg.cc/gjDmNRkh/copad.png
Requested by
Host: quark-airy-chef.glitch.me
URL: https://quark-airy-chef.glitch.me/fast.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.238.220.140 Los Angeles, United States, ASN23470 (RELIABLESITE, US),
Reverse DNS
Software
nginx /
Resource Hash
47f11b95f73135f7bc623be4083187d4d6343d17f9672214515576be46f81fdf

Request headers

accept-language
jp-JP,jp;q=0.9
Referer
https://quark-airy-chef.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36

Response headers

date
Sun, 01 Oct 2023 17:33:44 GMT
last-modified
Mon, 31 Jul 2023 11:12:33 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
4966
expires
Thu, 31 Dec 2037 23:55:55 GMT
memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
fonts.gstatic.com/s/opensans/v36/
18 KB
19 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v36/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2404:6800:4004:808::2003 , Australia, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
441e23601fe7525a142857c98cbb2784997579d51a17f736d7964dceee609709
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://quark-airy-chef.glitch.me
accept-language
jp-JP,jp;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/117.0.5938.132 Safari/537.36

Response headers

date
Tue, 26 Sep 2023 10:59:42 GMT
x-content-type-options
nosniff
age
455642
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
18664
x-xss-protection
0
last-modified
Thu, 14 Sep 2023 01:36:18 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 25 Sep 2024 10:59:42 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Coinbase (Crypto Exchange)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies