experienced-basalt-thunder.glitch.me Open in urlscan Pro
151.101.2.59  Malicious Activity! Public Scan

URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Submission: On April 17 via api from US — Scanned from IL

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 151.101.2.59, located in San Francisco, United States and belongs to FASTLY, US. The main domain is experienced-basalt-thunder.glitch.me.
TLS certificate: Issued by Certainly Intermediate R1 on April 11th 2025. Valid for: a month.
This is the only time experienced-basalt-thunder.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: RBC (Banking)

Domain & IP information

IP Address AS Autonomous System
1 151.101.2.59 54113 (FASTLY)
1 195.80.159.133 29152 (DECKNET-A...)
2 3
Apex Domain
Subdomains
Transfer
1 l2.io
l2.io — Cisco Umbrella Rank: 212118
229 B
1 glitch.me
experienced-basalt-thunder.glitch.me
3 MB
2 2
Domain Requested by
1 l2.io experienced-basalt-thunder.glitch.me
1 experienced-basalt-thunder.glitch.me
2 2
Subject Issuer Validity Valid
*.glitch.me
Certainly Intermediate R1
2025-04-11 -
2025-05-11
a month crt.sh
l2.io
R10
2025-03-01 -
2025-05-30
3 months crt.sh

This page contains 1 frames:

Primary Page: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Frame ID: D9A99E8A391B57E925DD2A528B9B6943
Requests: 7 HTTP requests in this frame

Screenshot

Page Title

RBC Royal Bank – Secure Sign In

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

3486 kB
Transfer

3755 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request R03bsSLP.htm
experienced-basalt-thunder.glitch.me/public/
3 MB
3 MB
Document
General
Full URL
https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.59 San Francisco, United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6cb88a29ec4c938594273254d93e023dba1d175de625bd6c7a89fedd7a17fa4c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
3566704
content-type
text/html; charset=utf-8
date
Thu, 17 Apr 2025 19:27:13 GMT
etag
"0c1891ff1c6f33146c9451ff127d485a"
last-modified
Tue, 15 Apr 2025 14:35:12 GMT
server
AmazonS3
via
1.1 varnish
x-amz-id-2
QxvpCMUJEpPZjyd8CGDGDrosIAIV8z1PDN89SVf3iqrNpAlOp2JpyXrzor3VBPRgG9w3cbL1IkUiPztxsYWgh7XxaG69BAVMwiyB/zigPdk=
x-amz-request-id
KMM64F0QPSDJVBWQ
x-amz-server-side-encryption
AES256
x-amz-version-id
null
x-cache
MISS, MISS
x-cache-hits
0, 0
x-served-by
cache-lon420116-LON, cache-lon420116-LON
x-timer
S1744918034.654996,VS0,VE147
ip.js
l2.io/
25 B
229 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: experienced-basalt-thunder.glitch.me
URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS Decknet SARL, FR),
Reverse DNS
Software
Apache/2.4.59 (Debian) /
Resource Hash
160b4ef9737a6795069ce9971cba7b2c0c704f5d21c741d1f3fb4269c34f54f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"
Referer
https://experienced-basalt-thunder.glitch.me/

Response headers

Keep-Alive
timeout=5, max=100
Content-Length
25
Date
Thu, 17 Apr 2025 19:27:15 GMT
Content-Type
text/html; charset=UTF-8
Server
Apache/2.4.59 (Debian)
Connection
Keep-Alive
truncated
/
441 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
aa78f941fad055ff3ee821a040dc6157a03d30e5e3c1a6e3c6de6269be7a197c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
561 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
4a099741603bab19985341e786a58b230d380e046a4b64cffd889944fd0454a8

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
760 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f107564e5e4a31791588c91d2fe6a54dbeeec7a8998bde2d131c2a52b9b823a7

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml
truncated
/
270 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1173f7c561d5791127c2dd03e4228effb2fc2726e1cd73832cb09fbf3db3d3f2

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/jpeg
truncated
/
355 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b6fd9ddd2c6c9fd1e15d5919547441753cd6b9076e16f77d17b861b78c168832

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/135.0.0.0 Safari/537.36
Referer

Response headers

Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: RBC (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader string| userip function| getMachine

0 Cookies

6 Console Messages

Source Level URL
Text
javascript warning URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm(Line 2)
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
recommendation warning URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Found 6 elements with non-unique id #signinNext: (More info: https://goo.gl/9p2vKq) %o %o %o %o %o %o
recommendation verbose URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "new-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o
recommendation verbose URL: https://experienced-basalt-thunder.glitch.me/public/R03bsSLP.htm
Message:
[DOM] Input elements should have autocomplete attributes (suggested: "current-password"): (More info: https://goo.gl/9p2vKq) %o