immediate-handy-soda.glitch.me
Open in
urlscan Pro
34.198.85.26
Malicious Activity!
Public Scan
Effective URL: https://immediate-handy-soda.glitch.me/public/JuRUsaW.htm
Submission: On December 09 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by Amazon RSA 2048 M02 on November 3rd 2024. Valid for: a year.
This is the only time immediate-handy-soda.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Navy Federal Credit Union (Government)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 34.227.125.234 34.227.125.234 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 34.198.85.26 34.198.85.26 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 195.80.159.133 195.80.159.133 | 29152 (DECKNET-A...) (DECKNET-AS Decknet SARL) | |
1 | 91.134.10.182 91.134.10.182 | 16276 (OVH OVH SAS) (OVH OVH SAS) | |
5 | 5 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-227-125-234.compute-1.amazonaws.com
sable-interesting-bait.glitch.me |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-198-85-26.compute-1.amazonaws.com
immediate-handy-soda.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
glitch.me
sable-interesting-bait.glitch.me immediate-handy-soda.glitch.me |
1 MB |
1 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 14048 |
3 KB |
1 |
l2.io
l2.io — Cisco Umbrella Rank: 195816 |
229 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
2 | sable-interesting-bait.glitch.me | |
1 | i.ibb.co |
immediate-handy-soda.glitch.me
|
1 | l2.io |
immediate-handy-soda.glitch.me
|
1 | immediate-handy-soda.glitch.me | |
5 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.navyfederal.org |
accountservices.navyfederal.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon RSA 2048 M02 |
2024-11-03 - 2025-12-03 |
a year | crt.sh |
l2.io R10 |
2024-11-01 - 2025-01-30 |
3 months | crt.sh |
ibb.co E6 |
2024-10-21 - 2025-01-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://immediate-handy-soda.glitch.me/public/JuRUsaW.htm
Frame ID: 3511F63F7285D56F49661B3C7CA3C7EB
Requests: 19 HTTP requests in this frame
Screenshot
Page Title
Navy Federal Credit Union - Our Members are the Mission®Page URL History Show full URLs
-
http://sable-interesting-bait.glitch.me/Upro9itA.htm
HTTP 307
https://sable-interesting-bait.glitch.me/Upro9itA.htm Page URL
- https://immediate-handy-soda.glitch.me/public/JuRUsaW.htm Page URL
Page Statistics
13 Outgoing links
These are links going to different origins than the main page.
Title: Locations
Search URL Search Domain Scan URL
Title: Contact Us
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: Sign In Help
Search URL Search Domain Scan URL
Title: Enroll in digital banking »
Search URL Search Domain Scan URL
Title: Learn more »
Search URL Search Domain Scan URL
Title: About Us
Search URL Search Domain Scan URL
Title: Privacy Policy
Search URL Search Domain Scan URL
Title: Security
Search URL Search Domain Scan URL
Title: Accessibility
Search URL Search Domain Scan URL
Title: Browser Support
Search URL Search Domain Scan URL
Title: Federally Insured by NCUA
Search URL Search Domain Scan URL
Title: Equal Housing Lender
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://sable-interesting-bait.glitch.me/Upro9itA.htm
HTTP 307
https://sable-interesting-bait.glitch.me/Upro9itA.htm Page URL
- https://immediate-handy-soda.glitch.me/public/JuRUsaW.htm Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://sable-interesting-bait.glitch.me/Upro9itA.htm HTTP 307
- https://sable-interesting-bait.glitch.me/Upro9itA.htm
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Upro9itA.htm
sable-interesting-bait.glitch.me/ Redirect Chain
|
150 B 509 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
JuRUsaW.htm
immediate-handy-soda.glitch.me/public/ |
1 MB 1 MB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
sable-interesting-bait.glitch.me/ |
4 KB 4 KB |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
ip.js
l2.io/ |
25 B 229 B |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
ajax-loader.gif
i.ibb.co/RpLNy4f/ |
3 KB 3 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
21 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
9 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
80 KB 80 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
23 KB 23 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
181 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
5 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
6 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Navy Federal Credit Union (Government)18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| 1 object| 2 object| 3 object| 4 function| savepage_ShadowLoader object| _cs function| _f0 function| sendEmail string| chat_id string| bot_token function| sendEmailo function| sendEmaili function| sendEmailii function| switchVisiblee90 function| sendEmailiii function| sendEmailiiii string| userip0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
9 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
i.ibb.co
immediate-handy-soda.glitch.me
l2.io
sable-interesting-bait.glitch.me
195.80.159.133
34.198.85.26
34.227.125.234
91.134.10.182
137f34c69c07dd3f6c1caf23bf0611cff6fe684b58ce75b22677abc149643001
16eb10aacb5be4e997453d0d2501d49e7d3a236828ee90f22cd3f913951a6d67
23aab794fd55fc8c61e500ec31232b21ee676c7ce084b39715a6ab1bb9700e0f
2cca552b4d48760fdce1fb2c0a21e6bf09b6ada1f7e70f5b1f4b7b810367c630
3e700f9ff93a023fcaee00daeb83062c9492803afc78643532d41d369133f991
6b6d9bf54da6c06a9f31eb3a11bd385b5f20233c2c2e63e08693bb33b4e2f1c7
83de0b26f5230608c42df74eab660c8e7a51ffe1710ce6c2514bd9c7756b5488
89a821c2c4f26ce58357c1e2fe213e58de98e7a7dd0ddc17e2b3aedeb3a1beae
94a271e503aa4ce07fe3c3d06dcd920cf626ea053af0c7a7917879973462e2e3
a8614e2be373b6407e95bca90a8d47ebf7bccb705475a85ee9997ee01ca38133
a9950fa5ca9cf47072770900d259bcf6778aa1119652d2e706d5eb92df254199
abd0ba3bfcdb6d0b220ce116d51b7317e7e872106601e1d4451fab6f23698d42
cf925f913c8b61816cf16964faf72dac116604841e6020c591e09e37149385ae
d3c66738cff7fddc343adf5eed0f1ace982866d8beacbd1d699c45ce7cde17d8
eac7a5450fce00715e381e02b2359fa4bd7ddd5a30f52e15ca9c342ce24d3b37
ee4321efb356cf875dacf07419eb2649351e5907c159754a94b7b3be02479fe9
efb3cdc5e4582fd67dffab6fc6e5062074ce3f8c51747346af944e97749dc309
fd29b3b084cf11160bfc4e99d98a261f2b36bff29113b07367c5204563c5d355