valiant-fate-penalty.glitch.me Open in urlscan Pro
52.0.52.225  Malicious Activity! Public Scan

URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Submission: On April 04 via api from US — Scanned from US

Summary

This website contacted 4 IPs in 2 countries across 3 domains to perform 3 HTTP transactions. The main IP is 52.0.52.225, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is valiant-fate-penalty.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time valiant-fate-penalty.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Navy Federal Credit Union (Government)

Domain & IP information

IP Address AS Autonomous System
1 52.0.52.225 14618 (AMAZON-AES)
1 195.80.159.133 29152 (DECKNET-AS)
1 169.197.85.95 26548 (PUREVOLTA...)
3 4
Apex Domain
Subdomains
Transfer
1 ibb.co
i.ibb.co — Cisco Umbrella Rank: 11706
3 KB
1 l2.io
l2.io — Cisco Umbrella Rank: 193582
227 B
1 glitch.me
valiant-fate-penalty.glitch.me
3 MB
3 3
Domain Requested by
1 i.ibb.co valiant-fate-penalty.glitch.me
1 l2.io valiant-fate-penalty.glitch.me
1 valiant-fate-penalty.glitch.me
3 3

This site contains links to these domains. Also see Links.

Domain
www.navyfederal.org
accountservices.navyfederal.org
Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M03
2023-12-04 -
2025-01-01
a year crt.sh
l2.io
R3
2024-03-05 -
2024-06-03
3 months crt.sh
ibb.co
R3
2024-02-07 -
2024-05-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Frame ID: D42A7D4D608B1B748612CD54F39C8F71
Requests: 17 HTTP requests in this frame

Screenshot

Page Title

Navy Federal Credit Union - Our Members are the Mission®

Page Statistics

3
Requests

100 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

2
Countries

2934 kB
Transfer

3168 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request ONLINE-09887876656.HTM
valiant-fate-penalty.glitch.me/public/
3 MB
3 MB
Document
General
Full URL
https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.0.52.225 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-0-52-225.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
e04cdf7be74ea00603b35d69fe9077a8cd6da86441b2597f017bf153fae845b5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
accept-language
en-US,en;q=0.9
sec-ch-ua
"Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
sec-ch-ua-mobile
?0
sec-ch-ua-platform
"Win32"

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
2858980
content-type
text/html; charset=utf-8
date
Thu, 04 Apr 2024 23:04:15 GMT
etag
"7d731d140e6e84c49db74b811ae8d417"
last-modified
Wed, 07 Feb 2024 10:34:41 GMT
server
AmazonS3
x-amz-id-2
Z1kxM2kiFBQfhELmVgjFoFsvla2v9MgLK35A5psxzpBgzsXgsQQ8DCTt6qigzE5CHzbKuQUs1Uo=
x-amz-request-id
KRKCF3X7R1DSGETM
x-amz-server-side-encryption
AES256
x-amz-version-id
null
ip.js
l2.io/
23 B
227 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: valiant-fate-penalty.glitch.me
URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS, FR),
Reverse DNS
Software
Apache/2.4.38 (Debian) /
Resource Hash
517810793c63b66710aacc01069c0b996fd1d2062172858246cec081b3de37ab

Request headers

sec-ch-ua
"Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
Referer
https://valiant-fate-penalty.glitch.me/
accept-language
en-US,en;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
sec-ch-ua-platform
"Win32"

Response headers

Date
Thu, 04 Apr 2024 23:04:16 GMT
Server
Apache/2.4.38 (Debian)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
23
Content-Type
text/html; charset=UTF-8
ajax-loader.gif
i.ibb.co/RpLNy4f/
3 KB
3 KB
Image
General
Full URL
https://i.ibb.co/RpLNy4f/ajax-loader.gif
Requested by
Host: valiant-fate-penalty.glitch.me
URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
169.197.85.95 , United States, ASN26548 (PUREVOLTAGE-INC, US),
Reverse DNS
Software
nginx /
Resource Hash
fd29b3b084cf11160bfc4e99d98a261f2b36bff29113b07367c5204563c5d355

Request headers

sec-ch-ua
"Google Chrome";v="123", "Not:A-Brand";v="8", "Chromium";v="123"
Referer
https://valiant-fate-penalty.glitch.me/
accept-language
en-US,en;q=0.9
sec-ch-ua-mobile
?0
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36
sec-ch-ua-platform
"Win32"

Response headers

date
Thu, 04 Apr 2024 23:04:15 GMT
last-modified
Tue, 02 Mar 2021 22:27:30 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/gif
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
3208
expires
Thu, 31 Dec 2037 23:55:55 GMT
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
2cca552b4d48760fdce1fb2c0a21e6bf09b6ada1f7e70f5b1f4b7b810367c630

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
21 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
3e700f9ff93a023fcaee00daeb83062c9492803afc78643532d41d369133f991

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
16eb10aacb5be4e997453d0d2501d49e7d3a236828ee90f22cd3f913951a6d67

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
eac7a5450fce00715e381e02b2359fa4bd7ddd5a30f52e15ca9c342ce24d3b37

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
9 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
abd0ba3bfcdb6d0b220ce116d51b7317e7e872106601e1d4451fab6f23698d42

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
16 KB
16 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
efb3cdc5e4582fd67dffab6fc6e5062074ce3f8c51747346af944e97749dc309

Request headers

Referer
Origin
https://valiant-fate-penalty.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
16 KB
16 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a9950fa5ca9cf47072770900d259bcf6778aa1119652d2e706d5eb92df254199

Request headers

Referer
Origin
https://valiant-fate-penalty.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
font/woff2
truncated
/
80 KB
80 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
94a271e503aa4ce07fe3c3d06dcd920cf626ea053af0c7a7917879973462e2e3

Request headers

Referer
Origin
https://valiant-fate-penalty.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
text/plain
truncated
/
23 KB
23 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
a8614e2be373b6407e95bca90a8d47ebf7bccb705475a85ee9997ee01ca38133

Request headers

Referer
Origin
https://valiant-fate-penalty.glitch.me
accept-language
en-US,en;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
text/plain
truncated
/
181 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ee4321efb356cf875dacf07419eb2649351e5907c159754a94b7b3be02479fe9

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/jpeg
truncated
/
5 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d3c66738cff7fddc343adf5eed0f1ace982866d8beacbd1d699c45ce7cde17d8

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
89a821c2c4f26ce58357c1e2fe213e58de98e7a7dd0ddc17e2b3aedeb3a1beae

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
137f34c69c07dd3f6c1caf23bf0611cff6fe684b58ce75b22677abc149643001

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
6 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
83de0b26f5230608c42df74eab660c8e7a51ffe1710ce6c2514bd9c7756b5488

Request headers

accept-language
en-US,en;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/123.0.0.0 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Navy Federal Credit Union (Government)

18 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 object| 1 object| 2 object| 3 object| 4 function| savepage_ShadowLoader object| _cs function| _f0 function| sendEmail string| chat_id string| bot_token function| sendEmailo function| sendEmaili function| sendEmailii function| switchVisiblee90 function| sendEmailiii function| sendEmailiiii string| userip

0 Cookies

7 Console Messages

Source Level URL
Text
javascript warning URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM(Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM(Line 3)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
recommendation warning URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Message:
[DOM] Found 6 elements with non-unique id #Login: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o
recommendation warning URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Message:
[DOM] Found 6 elements with non-unique id #signIn: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o
recommendation verbose URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://valiant-fate-penalty.glitch.me/public/ONLINE-09887876656.HTM
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o