organized-seed-agate.glitch.me Open in urlscan Pro
34.235.79.124  Malicious Activity! Public Scan

URL: https://organized-seed-agate.glitch.me/
Submission: On December 16 via automatic, source phishtank — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 34.235.79.124, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is organized-seed-agate.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M02 on November 3rd 2024. Valid for: a year.
This is the only time organized-seed-agate.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Generic Postmaster (Online)

Domain & IP information

IP Address AS Autonomous System
2 34.235.79.124 14618 (AMAZON-AES)
2 2
Apex Domain
Subdomains
Transfer
2 glitch.me
organized-seed-agate.glitch.me
167 KB
2 1
Domain Requested by
2 organized-seed-agate.glitch.me
2 1

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M02
2024-11-03 -
2025-12-03
a year crt.sh

This page contains 1 frames:

Primary Page: https://organized-seed-agate.glitch.me/
Frame ID: 0C37446C454A35EF85AD9552C762E294
Requests: 4 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

167 kB
Transfer

213 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
organized-seed-agate.glitch.me/
163 KB
164 KB
Document
General
Full URL
https://organized-seed-agate.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.79.124 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-79-124.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
03c1692bc94adfc14fb2b4062bd7b1c745e28040ca4fad31da91820f355c9d61

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
167160
content-type
text/html; charset=utf-8
date
Mon, 16 Dec 2024 00:33:14 GMT
etag
"7ead7f5c786604d09e0b9b6c4063b666"
last-modified
Mon, 09 Dec 2024 23:05:38 GMT
server
AmazonS3
x-amz-id-2
s/lM8do8segXMy4DikUQEppdo0huVqXoxS1uuwo+AVzCSwVTXk5K0g9HtPuZuVuJ8c8FFYKAqyg=
x-amz-request-id
RANR76ZQWZ9FSPXA
x-amz-server-side-encryption
AES256
x-amz-version-id
VIFPeB_SAHNrTQoXtWdvBMb0URFv.eoZ
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
9241453e99644ed913735907d62b2ce5c6ef51c18f0780e95857fc345ba511d3

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
truncated
/
41 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
59d7f74e29500e39832625a29b47a6d709703193ca0ad5c537118ae8712a8ac4

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/png
favicon.ico
organized-seed-agate.glitch.me/
4 KB
4 KB
Other
General
Full URL
https://organized-seed-agate.glitch.me/favicon.ico
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.235.79.124 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-235-79-124.compute-1.amazonaws.com
Software
/
Resource Hash
2784f6ffefbd5fcae302d112e1629907deed1e36f9c2050ea6d7038eec3f649c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://organized-seed-agate.glitch.me/

Response headers

date
Mon, 16 Dec 2024 00:33:15 GMT
cache-control
max-age=0
content-length
3674

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Generic Postmaster (Online)

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| _A50H35mL12qk99eWjM12SQ049X1R4ejpfo function| _QTW7v07E7O88q9h34lb8s995Gkyp1qUk0c1B3e75Bz object| _$ object| _V77u0W95chN2s6C2VUJ84CW9S number| _D0S246T0881I4cS3K907pW5iY75jOeEZnYTC8xOgKjw334F object| _WB0KDTM76i2UD0zV3VK object| _Lm10XZapTpHikci0EGx1Hbug8RKH0Ok48yXJRYdb object| _YuYfU6W7jGd081eXnOuti4t1NY object| mail

0 Cookies

2 Console Messages

Source Level URL
Text
recommendation verbose URL: https://organized-seed-agate.glitch.me/
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
network error URL: https://organized-seed-agate.glitch.me/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()