request-account-verification.glitch.me
Open in
urlscan Pro
34.228.91.241
Malicious Activity!
Public Scan
Submission: On September 30 via manual from PL — Scanned from PL
Summary
TLS certificate: Issued by Amazon RSA 2048 M01 on February 22nd 2023. Valid for: a year.
This is the only time request-account-verification.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 34.228.91.241 34.228.91.241 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 35.186.245.55 35.186.245.55 | 15169 (GOOGLE) (GOOGLE) | |
1 | 151.101.66.132 151.101.66.132 | 54113 (FASTLY) (FASTLY) | |
4 | 3 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-228-91-241.compute-1.amazonaws.com
request-account-verification.glitch.me |
ASN15169 (GOOGLE, US)
PTR: 55.245.186.35.bc.googleusercontent.com
violation--appeal-page.repl.co |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
glitch.me
request-account-verification.glitch.me |
5 KB |
1 |
glitch.global
cdn.glitch.global — Cisco Umbrella Rank: 391200 |
7 KB |
1 |
repl.co
violation--appeal-page.repl.co |
40 KB |
4 | 3 |
Domain | Requested by | |
---|---|---|
2 | request-account-verification.glitch.me |
request-account-verification.glitch.me
|
1 | cdn.glitch.global |
request-account-verification.glitch.me
|
1 | violation--appeal-page.repl.co |
request-account-verification.glitch.me
|
4 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M01 |
2023-02-22 - 2024-02-01 |
a year | crt.sh |
repl.co GTS CA 1P5 |
2023-08-21 - 2023-11-19 |
3 months | crt.sh |
cdn.glitch.global R3 |
2023-08-04 - 2023-11-02 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://request-account-verification.glitch.me/submit-form.php
Frame ID: 3D80F302DD073E41137C4930CCB3116E
Requests: 4 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
submit-form.php
request-account-verification.glitch.me/ |
8 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
violation--appeal-page.repl.co/help/appeal/password/pass/ |
39 KB 40 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style1.css
request-account-verification.glitch.me/ |
10 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
cdn.glitch.global/95d9887f-2185-42c7-a188-6f3dd0cbab97/ |
6 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)10 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture string| tanggallengkap object| namahari object| namabulan object| tgl number| hari number| tanggal number| bulan number| tahun function| mousedwn0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.glitch.global
request-account-verification.glitch.me
violation--appeal-page.repl.co
151.101.66.132
34.228.91.241
35.186.245.55
153b4a03a6a7ed8a99da4072c097f3a04e02586c2cee7fc685be0e5fab23d8fb
22101e9bb560e47d5bb4f1423f394921fcee2cc6a826baaa3fbc8570708d572c
c1cd63bbc4ccd6611d361a28ff04ee15469b67e231139813c2b664e26f0953d3
e03ffeac4a8c76fc407678e52bc5deb4fe3d530d8be3b6e8984eac418723f6b8