plaid-exciting-act.glitch.me Open in urlscan Pro
34.225.211.63  Malicious Activity! Public Scan

URL: https://plaid-exciting-act.glitch.me/twey.HTM
Submission: On April 27 via api from DE — Scanned from DE

Summary

This website contacted 5 IPs in 4 countries across 5 domains to perform 5 HTTP transactions. The main IP is 34.225.211.63, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is plaid-exciting-act.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M01 on February 22nd 2023. Valid for: a year.
This is the only time plaid-exciting-act.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Tesco Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 34.225.211.63 14618 (AMAZON-AES)
1 109.169.71.112 20860 (IOMART-AS)
1 195.80.159.133 29152 (DECKNET-AS)
1 2a00:1450:400... 15169 (GOOGLE)
5 5
Apex Domain
Subdomains
Transfer
1 googleapis.com
ajax.googleapis.com — Cisco Umbrella Rank: 607
31 KB
1 l2.io
l2.io — Cisco Umbrella Rank: 332643
231 B
1 smtpjs.com
smtpjs.com — Cisco Umbrella Rank: 141021
1 KB
1 glitch.me
plaid-exciting-act.glitch.me
2 MB
0 tescobank.com Failed
identity.tescobank.com Failed
5 5
Domain Requested by
1 ajax.googleapis.com plaid-exciting-act.glitch.me
1 l2.io plaid-exciting-act.glitch.me
1 smtpjs.com plaid-exciting-act.glitch.me
1 plaid-exciting-act.glitch.me
0 identity.tescobank.com Failed plaid-exciting-act.glitch.me
5 5

This site contains links to these domains. Also see Links.

Domain
identity.tescobank.com
www.tescobank.com
Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M01
2023-02-22 -
2024-02-01
a year crt.sh
smtpjs.com
R3
2023-04-15 -
2023-07-14
3 months crt.sh
l2.io
R3
2023-03-31 -
2023-06-29
3 months crt.sh
upload.video.google.com
GTS CA 1C3
2023-04-03 -
2023-06-26
3 months crt.sh

This page contains 1 frames:

Primary Page: https://plaid-exciting-act.glitch.me/twey.HTM
Frame ID: C435D6AB2BF44D27BFF8D65068655401
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

Online Banking Login - Tesco BankTesco Bank

Detected technologies

Overall confidence: 100%
Detected patterns
  • /([\d.]+)/jquery(?:\.min)?\.js
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

5
Requests

80 %
HTTPS

25 %
IPv6

5
Domains

5
Subdomains

5
IPs

4
Countries

2258 kB
Transfer

2327 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

5 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request twey.HTM
plaid-exciting-act.glitch.me/
2 MB
2 MB
Document
General
Full URL
https://plaid-exciting-act.glitch.me/twey.HTM
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
34.225.211.63 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-34-225-211-63.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
e0ff6cf0ebecc83715ff0c775d1a3defad5558e293153102a17a359ed4704062

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
2192019
content-type
text/html; charset=utf-8
date
Thu, 27 Apr 2023 05:48:23 GMT
etag
"07445bab0d83381cb9def79f0f486b89"
last-modified
Thu, 27 Apr 2023 05:44:58 GMT
server
AmazonS3
x-amz-id-2
tT6kuYvGFGJ53YG47wmuCpVvtDamyBlQKw1COnSAsXkWEOkqdpFVAywLoY2Lim0v6jD0SdeTAoY=
x-amz-request-id
0T52J20BKCETHC6S
x-amz-server-side-encryption
AES256
x-amz-version-id
RwTZxH0Ifw7FUpULMFGLlmExXM7TXj9D
smtp.js
smtpjs.com/v3/
871 B
1 KB
Script
General
Full URL
https://smtpjs.com/v3/smtp.js
Requested by
Host: plaid-exciting-act.glitch.me
URL: https://plaid-exciting-act.glitch.me/twey.HTM
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
109.169.71.112 , United Kingdom, ASN20860 (IOMART-AS, GB),
Reverse DNS
Software
Microsoft-IIS/10.0 / ASP.NET
Resource Hash
1fd711cb491a361ef91e29c50de0680a4b156c0b34bb91e18570d0037263a776

Request headers

Referer
https://plaid-exciting-act.glitch.me/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Thu, 27 Apr 2023 05:48:23 GMT
last-modified
Tue, 10 Nov 2020 17:17:51 GMT
server
Microsoft-IIS/10.0
etag
"162f436b85b7d61:0"
x-powered-by
ASP.NET
content-type
application/javascript
access-control-allow-origin
*
accept-ranges
bytes
content-length
871
ip.js
l2.io/
27 B
231 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: plaid-exciting-act.glitch.me
URL: https://plaid-exciting-act.glitch.me/twey.HTM
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS, FR),
Reverse DNS
Software
Apache/2.4.38 (Debian) /
Resource Hash
f1ddba417d317cdf642f8106c6d71a4e9d8f94eceb4984ce1bc2050b4e6894c6

Request headers

Referer
https://plaid-exciting-act.glitch.me/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Thu, 27 Apr 2023 05:48:24 GMT
Server
Apache/2.4.38 (Debian)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
27
Content-Type
text/html; charset=UTF-8
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/3.5.1/
87 KB
31 KB
Script
General
Full URL
https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js
Requested by
Host: plaid-exciting-act.glitch.me
URL: https://plaid-exciting-act.glitch.me/twey.HTM
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:801::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://plaid-exciting-act.glitch.me/
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

date
Sat, 22 Apr 2023 17:33:29 GMT
content-encoding
gzip
x-content-type-options
nosniff
age
389695
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/hosted-libraries-pushers
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
31021
x-xss-protection
0
last-modified
Fri, 08 May 2020 07:05:03 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="hosted-libraries-pushers"
vary
Accept-Encoding
report-to
{"group":"hosted-libraries-pushers","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/hosted-libraries-pushers"}]}
content-type
text/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
public, max-age=31536000, stale-while-revalidate=2592000
accept-ranges
bytes
timing-allow-origin
*
expires
Sun, 21 Apr 2024 17:33:29 GMT
truncated
/
16 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7f90c6547a2cc2bf37c1e7b4433eb5c5e56a766c8f357948b043078ad4024750

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36

Response headers

Content-Type
image/png
/
identity.tescobank.com/
0
0

truncated
/
27 KB
27 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5f9c15b61eb2e0552290225807a6826c7dc7b8396fa3c05ead5b24d2a9b0ba10

Request headers

Referer
Origin
https://plaid-exciting-act.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
27 KB
27 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
fc3de12503ecb116a9f44677fa8d2b1c066d2313189b89fb2df5817f5d907ca2

Request headers

Referer
Origin
https://plaid-exciting-act.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
28 KB
28 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
568219ca839f8425765048f6ff3214e8fa5ce4025f4315e7e1e3be5b906c0b63

Request headers

Referer
Origin
https://plaid-exciting-act.glitch.me
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/112.0.5615.121 Safari/537.36

Response headers

Content-Type
font/woff2

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
identity.tescobank.com
URL
https://identity.tescobank.com/

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Tesco Bank (Banking)

7 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless function| savepage_ShadowLoader object| Email string| userip function| $ function| jQuery function| isNumber

0 Cookies

6 Console Messages

Source Level URL
Text
javascript warning URL: https://plaid-exciting-act.glitch.me/twey.HTM
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://smtpjs.com/v3/smtp.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://plaid-exciting-act.glitch.me/twey.HTM
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://smtpjs.com/v3/smtp.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://plaid-exciting-act.glitch.me/twey.HTM
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://plaid-exciting-act.glitch.me/twey.HTM
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://ajax.googleapis.com/ajax/libs/jquery/3.5.1/jquery.min.js, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript error URL: https://plaid-exciting-act.glitch.me/twey.HTM
Message:
Access to font at 'https://identity.tescobank.com/' from origin 'https://plaid-exciting-act.glitch.me' has been blocked by CORS policy: No 'Access-Control-Allow-Origin' header is present on the requested resource.
network error URL: https://identity.tescobank.com/
Message:
Failed to load resource: net::ERR_FAILED