pineapple-tested-locust.glitch.me Open in urlscan Pro
52.2.151.71  Malicious Activity! Public Scan

URL: https://pineapple-tested-locust.glitch.me/xan.html
Submission: On November 22 via api from US — Scanned from US

Summary

This website contacted 4 IPs in 1 countries across 4 domains to perform 4 HTTP transactions. The main IP is 52.2.151.71, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is pineapple-tested-locust.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M01 on February 22nd 2023. Valid for: a year.
This is the only time pineapple-tested-locust.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Coinbase (Crypto Exchange)

Domain & IP information

IP Address AS Autonomous System
1 52.2.151.71 14618 (AMAZON-AES)
1 2607:f8b0:400... 15169 (GOOGLE)
1 185.150.190.236 23470 (RELIABLESITE)
1 2607:f8b0:400... 15169 (GOOGLE)
4 4
Apex Domain
Subdomains
Transfer
1 gstatic.com
fonts.gstatic.com
19 KB
1 postimg.cc
i.postimg.cc — Cisco Umbrella Rank: 18725
5 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 31
1 KB
1 glitch.me
pineapple-tested-locust.glitch.me
4 KB
4 4
Domain Requested by
1 fonts.gstatic.com fonts.googleapis.com
1 i.postimg.cc pineapple-tested-locust.glitch.me
1 fonts.googleapis.com pineapple-tested-locust.glitch.me
1 pineapple-tested-locust.glitch.me
4 4

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M01
2023-02-22 -
2024-02-01
a year crt.sh
upload.video.google.com
GTS CA 1C3
2023-10-23 -
2024-01-15
3 months crt.sh
postimg.cc
R3
2023-10-24 -
2024-01-22
3 months crt.sh
*.gstatic.com
GTS CA 1C3
2023-10-23 -
2024-01-15
3 months crt.sh

This page contains 1 frames:

Primary Page: https://pineapple-tested-locust.glitch.me/xan.html
Frame ID: 07D4AE11F4DC381FA4BF67D746018027
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

info

Page Statistics

4
Requests

100 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

4
IPs

1
Countries

29 kB
Transfer

29 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request xan.html
pineapple-tested-locust.glitch.me/
4 KB
4 KB
Document
General
Full URL
https://pineapple-tested-locust.glitch.me/xan.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.2.151.71 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-2-151-71.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
8bbf5e7ad85f3285452f1183357463c9a234ade77b786d04c1ec9bbce3e7e892

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
3633
content-type
text/html; charset=utf-8
date
Wed, 22 Nov 2023 20:50:51 GMT
etag
"7562dc55e9248b5a4fe10aa991bb8aff"
last-modified
Mon, 20 Nov 2023 21:27:56 GMT
server
AmazonS3
x-amz-id-2
H3O7E3ExAxsjHWOl+2+pKadDWWYlCneLSJ60rZWlG7hroEwT0idyj7lhnKJOn7ExDcwGuxKcbq9gQt9kPWAsft5Te0XFfVJTxl28Y4RJ0Bw=
x-amz-request-id
N7MYK0DDDNGV0BK4
x-amz-server-side-encryption
AES256
x-amz-version-id
tWTPLW7YEYzkbuCPQ0wkYOLeSfz_BMqE
css
fonts.googleapis.com/
3 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans
Requested by
Host: pineapple-tested-locust.glitch.me
URL: https://pineapple-tested-locust.glitch.me/xan.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2607:f8b0:4004:c1b::5f Washington, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
4ddf6973fa3421cc10d8946187a761c0317632b66442c3d20c736024fba1029f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
en-US,en;q=0.9
Referer
https://pineapple-tested-locust.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Wed, 22 Nov 2023 20:50:52 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Wed, 22 Nov 2023 20:08:39 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Wed, 22 Nov 2023 20:50:52 GMT
cb675.png
i.postimg.cc/zG3nVT0g/
5 KB
5 KB
Image
General
Full URL
https://i.postimg.cc/zG3nVT0g/cb675.png
Requested by
Host: pineapple-tested-locust.glitch.me
URL: https://pineapple-tested-locust.glitch.me/xan.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
185.150.190.236 Piscataway, United States, ASN23470 (RELIABLESITE, US),
Reverse DNS
Software
nginx /
Resource Hash
47f11b95f73135f7bc623be4083187d4d6343d17f9672214515576be46f81fdf

Request headers

accept-language
en-US,en;q=0.9
Referer
https://pineapple-tested-locust.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36

Response headers

date
Wed, 22 Nov 2023 20:50:51 GMT
last-modified
Tue, 24 Oct 2023 01:26:10 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
4966
expires
Thu, 31 Dec 2037 23:55:55 GMT
memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
fonts.gstatic.com/s/opensans/v36/
18 KB
19 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v36/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2607:f8b0:4004:c1d::5e Washington, United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
441e23601fe7525a142857c98cbb2784997579d51a17f736d7964dceee609709
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Referer
https://fonts.googleapis.com/
Origin
https://pineapple-tested-locust.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.159 Safari/537.36

Response headers

date
Tue, 21 Nov 2023 23:31:50 GMT
x-content-type-options
nosniff
age
76742
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
content-length
18664
x-xss-protection
0
last-modified
Thu, 14 Sep 2023 01:36:18 GMT
server
sffe
cross-origin-opener-policy
same-origin; report-to="apps-themes"
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
content-type
font/woff2
access-control-allow-origin
*
cache-control
public, max-age=31536000
accept-ranges
bytes
timing-allow-origin
*
expires
Wed, 20 Nov 2024 23:31:50 GMT

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Coinbase (Crypto Exchange)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies