traveling-prickle-plow.glitch.me Open in urlscan Pro
44.197.227.46  Malicious Activity! Public Scan

URL: https://traveling-prickle-plow.glitch.me/vire02xac.html
Submission: On July 12 via api from US — Scanned from US

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 6 HTTP transactions. The main IP is 44.197.227.46, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is traveling-prickle-plow.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time traveling-prickle-plow.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Telekom (Telecommunication)

Domain & IP information

IP Address AS Autonomous System
2 44.197.227.46 14618 (AMAZON-AES)
1 2607:f8b0:400... 15169 (GOOGLE)
3 162.249.168.129 26548 (PUREVOLTA...)
6 3
Apex Domain
Subdomains
Transfer
3 postimg.cc
i.postimg.cc — Cisco Umbrella Rank: 18623
196 KB
2 glitch.me
traveling-prickle-plow.glitch.me
257 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 74
1 KB
6 3
Domain Requested by
3 i.postimg.cc traveling-prickle-plow.glitch.me
2 traveling-prickle-plow.glitch.me
1 fonts.googleapis.com traveling-prickle-plow.glitch.me
6 3

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M03
2023-12-04 -
2025-01-01
a year crt.sh
upload.video.google.com
WR2
2024-06-24 -
2024-09-16
3 months crt.sh
postimg.cc
R11
2024-06-21 -
2024-09-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://traveling-prickle-plow.glitch.me/vire02xac.html
Frame ID: 3D1053B896D59A6EC14A0F18BB8C9AF2
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

ver

Page Statistics

6
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

454 kB
Transfer

454 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request vire02xac.html
traveling-prickle-plow.glitch.me/
253 KB
254 KB
Document
General
Full URL
https://traveling-prickle-plow.glitch.me/vire02xac.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.197.227.46 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-44-197-227-46.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
1de3a16391279b6ca17a1dac672aaf4f99adc1565c14cd15580ec439d63f53e4

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
259094
content-type
text/html; charset=utf-8
date
Fri, 12 Jul 2024 12:08:40 GMT
etag
"e66ceb9facb4fbd1fc5e765f6e1da510"
last-modified
Thu, 11 Jul 2024 09:29:59 GMT
server
AmazonS3
x-amz-id-2
syFBK7otvwQwsh6Lvqp9R5lDOEKIVFwWApyJhhaKdNu64iYhdG/Wx5tcaaKkxOYOKWSvTQheblI=
x-amz-request-id
JK5WKXQQ3NW6G734
x-amz-server-side-encryption
AES256
x-amz-version-id
kKZ6FCuW79DanyN9a9kvuaX2trSsR.SQ
css2
fonts.googleapis.com/
3 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=Arimo&display=swap
Requested by
Host: traveling-prickle-plow.glitch.me
URL: https://traveling-prickle-plow.glitch.me/vire02xac.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2607:f8b0:4006:81f::200a , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
2ada64fb4d60eb3e782a0d83e8939da7131ec20cc9f60dbd3e96d2b46eaa186f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

Referer
https://traveling-prickle-plow.glitch.me/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Fri, 12 Jul 2024 12:08:41 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Fri, 12 Jul 2024 11:47:20 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Fri, 12 Jul 2024 12:08:41 GMT
1.png
i.postimg.cc/DvzRr72B/
52 KB
52 KB
Image
General
Full URL
https://i.postimg.cc/DvzRr72B/1.png
Requested by
Host: traveling-prickle-plow.glitch.me
URL: https://traveling-prickle-plow.glitch.me/vire02xac.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
162.249.168.129 , United States, ASN26548 (PUREVOLTAGE-INC, US),
Reverse DNS
Software
nginx /
Resource Hash
5780b8cca57dcc611e17d1dd7ba8791fcc6bae56be6b6f3004a4a16f8eb87c5b

Request headers

Referer
https://traveling-prickle-plow.glitch.me/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Fri, 12 Jul 2024 12:08:41 GMT
last-modified
Mon, 17 Oct 2022 07:56:10 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
53176
expires
Thu, 31 Dec 2037 23:55:55 GMT
2.png
i.postimg.cc/c4dR3LWJ/
82 KB
82 KB
Image
General
Full URL
https://i.postimg.cc/c4dR3LWJ/2.png
Requested by
Host: traveling-prickle-plow.glitch.me
URL: https://traveling-prickle-plow.glitch.me/vire02xac.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
162.249.168.129 , United States, ASN26548 (PUREVOLTAGE-INC, US),
Reverse DNS
Software
nginx /
Resource Hash
521c7c449668ee435cff2fdb1e87dd60c022c4a41e16b7d8daad6c2838a7096e

Request headers

Referer
https://traveling-prickle-plow.glitch.me/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Fri, 12 Jul 2024 12:08:41 GMT
last-modified
Mon, 17 Oct 2022 07:56:58 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
83474
expires
Thu, 31 Dec 2037 23:55:55 GMT
3.png
i.postimg.cc/4fzH1RBH/
62 KB
62 KB
Image
General
Full URL
https://i.postimg.cc/4fzH1RBH/3.png
Requested by
Host: traveling-prickle-plow.glitch.me
URL: https://traveling-prickle-plow.glitch.me/vire02xac.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
162.249.168.129 , United States, ASN26548 (PUREVOLTAGE-INC, US),
Reverse DNS
Software
nginx /
Resource Hash
6d469d3d2d2f857c7071be46015745f5528cc844a8cd25bf70e515e7ddd8cf31

Request headers

Referer
https://traveling-prickle-plow.glitch.me/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Fri, 12 Jul 2024 12:08:41 GMT
last-modified
Mon, 17 Oct 2022 07:57:46 GMT
server
nginx
access-control-allow-methods
GET, OPTIONS
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=315360000, public
accept-ranges
bytes
content-length
63028
expires
Thu, 31 Dec 2037 23:55:55 GMT
favicon.ico
traveling-prickle-plow.glitch.me/
4 KB
4 KB
Other
General
Full URL
https://traveling-prickle-plow.glitch.me/favicon.ico
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
44.197.227.46 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-44-197-227-46.compute-1.amazonaws.com
Software
/
Resource Hash
2784f6ffefbd5fcae302d112e1629907deed1e36f9c2050ea6d7038eec3f649c

Request headers

Referer
https://traveling-prickle-plow.glitch.me/vire02xac.html
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Fri, 12 Jul 2024 12:08:41 GMT
cache-control
max-age=0
content-length
3674

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Telekom (Telecommunication)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://traveling-prickle-plow.glitch.me/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()