experienced-basalt-thunder.glitch.me Open in urlscan Pro
2a04:4e42::571  Malicious Activity! Public Scan

Submitted URL: https://polyester-stealth-centaur.glitch.me/v2waB8.htm
Effective URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Submission: On April 17 via automatic, source openphish — Scanned from US

Summary

This website contacted 4 IPs in 2 countries across 2 domains to perform 4 HTTP transactions. The main IP is 2a04:4e42::571, located in United States and belongs to FASTLY, US. The main domain is experienced-basalt-thunder.glitch.me.
TLS certificate: Issued by Certainly Intermediate R1 on April 11th 2025. Valid for: a month.
This is the only time experienced-basalt-thunder.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: RBC (Banking)

Domain & IP information

IP Address AS Autonomous System
2 2a04:4e42:200... 54113 (FASTLY)
1 2a04:4e42::571 54113 (FASTLY)
1 195.80.159.133 29152 (DECKNET-A...)
4 4
Apex Domain
Subdomains
Transfer
3 glitch.me
polyester-stealth-centaur.glitch.me
experienced-basalt-thunder.glitch.me
3 MB
1 l2.io
l2.io — Cisco Umbrella Rank: 212923
229 B
4 2
Domain Requested by
2 polyester-stealth-centaur.glitch.me
1 l2.io experienced-basalt-thunder.glitch.me
1 experienced-basalt-thunder.glitch.me
4 3
Subject Issuer Validity Valid
*.glitch.me
Certainly Intermediate R1
2025-04-11 -
2025-05-11
a month crt.sh
l2.io
R10
2025-03-01 -
2025-05-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Frame ID: 7B6A72784577DC769D0FA2821E4559F5
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

RBC Royal Bank – Secure Sign In

Page URL History Show full URLs

  1. https://polyester-stealth-centaur.glitch.me/v2waB8.htm Page URL
  2. https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm Page URL

Page Statistics

4
Requests

100 %
HTTPS

67 %
IPv6

2
Domains

3
Subdomains

4
IPs

2
Countries

3490 kB
Transfer

3759 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://polyester-stealth-centaur.glitch.me/v2waB8.htm Page URL
  2. https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
v2waB8.htm
polyester-stealth-centaur.glitch.me/
157 B
606 B
Document
General
Full URL
https://polyester-stealth-centaur.glitch.me/v2waB8.htm
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:200::571 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
21f95f32cf851f541355d5b31686c54f0a1c425227bed6a6a73f6a3633e13001

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
157
content-type
text/html; charset=utf-8
date
Thu, 17 Apr 2025 05:19:44 GMT
etag
"5859aa723b6fb5fc4dd046daa852bbaa"
last-modified
Tue, 15 Apr 2025 14:46:35 GMT
server
AmazonS3
via
1.1 varnish
x-amz-id-2
erXC2gbaecFopXo6OfrddA65RatpMfesWgFQci5gPKtfXZvT53JwcM0ukfKxb3ZeuqXtHp2i43VQspBZ+hYuUDtL9XeQ6fla7UQCfI/gG7Y=
x-amz-request-id
6HBX0FE2QX0WMF8P
x-amz-server-side-encryption
AES256
x-amz-version-id
CLjI_dCjdLJE4UFN1r1OLH_wYQBLT6Cg
x-cache
MISS, MISS
x-cache-hits
0, 0
x-served-by
cache-lga21929-LGA, cache-lga21929-LGA
x-timer
S1744867184.477083,VS0,VE64
Primary Request R03bsSLP.htm
experienced-basalt-thunder.glitch.me/public/
3 MB
3 MB
Document
General
Full URL
https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42::571 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6cb88a29ec4c938594273254d93e023dba1d175de625bd6c7a89fedd7a17fa4c

Request headers

Referer
https://polyester-stealth-centaur.glitch.me/
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
3566704
content-type
text/html; charset=utf-8
date
Thu, 17 Apr 2025 05:19:44 GMT
etag
"0c1891ff1c6f33146c9451ff127d485a"
last-modified
Tue, 15 Apr 2025 14:35:12 GMT
server
AmazonS3
via
1.1 varnish
x-amz-id-2
ZbVwu43yIlImxLbMM/AAc7/f+rZKNbg2jagZ0y+wZahSLlpXh6uz32Q3WMVjXKyGZV50iArkLVc4qvz3N4kYvoxWHi/ulBiI
x-amz-request-id
6HBQ94XRMMASWQVQ
x-amz-server-side-encryption
AES256
x-amz-version-id
null
x-cache
MISS, MISS
x-cache-hits
0, 0
x-served-by
cache-lga21986-LGA, cache-lga21986-LGA
x-timer
S1744867185.637090,VS0,VE181
favicon.ico
polyester-stealth-centaur.glitch.me/
4 KB
4 KB
Other
General
Full URL
https://polyester-stealth-centaur.glitch.me/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a04:4e42:200::571 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
/
Resource Hash

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer
https://polyester-stealth-centaur.glitch.me/v2waB8.htm

Response headers

cache-control
max-age=0
x-timer
S1744867185.579737,VS0,VE62
via
1.1 varnish
accept-ranges
bytes
x-cache
MISS, MISS
content-length
3674
date
Thu, 17 Apr 2025 05:19:44 GMT
x-served-by
cache-lga21929-LGA, cache-lga21929-LGA
x-cache-hits
0, 0
ip.js
l2.io/
25 B
229 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: experienced-basalt-thunder.glitch.me
URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS Decknet SARL, FR),
Reverse DNS
Software
Apache/2.4.59 (Debian) /
Resource Hash
3dfeab20cf3944864ebd01e7d052d7cae53ec0590660a42754ab8af971d9096d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://experienced-basalt-thunder.glitch.me/

Response headers

Keep-Alive
timeout=5, max=100
Content-Length
25
Date
Thu, 17 Apr 2025 05:19:45 GMT
Content-Type
text/html; charset=UTF-8
Server
Apache/2.4.59 (Debian)
Connection
Keep-Alive
truncated
/
441 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
aa78f941fad055ff3ee821a040dc6157a03d30e5e3c1a6e3c6de6269be7a197c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
561 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4a099741603bab19985341e786a58b230d380e046a4b64cffd889944fd0454a8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
760 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f107564e5e4a31791588c91d2fe6a54dbeeec7a8998bde2d131c2a52b9b823a7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
270 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1173f7c561d5791127c2dd03e4228effb2fc2726e1cd73832cb09fbf3db3d3f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/jpeg
truncated
/
355 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b6fd9ddd2c6c9fd1e15d5919547441753cd6b9076e16f77d17b861b78c168832

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: RBC (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader string| userip function| getMachine

0 Cookies

7 Console Messages

Source Level URL
Text
network error URL: https://polyester-stealth-centaur.glitch.me/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()
javascript warning URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
recommendation warning URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Found 6 elements with non-unique id #signinNext: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o
recommendation verbose URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "new-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o