pushy-scandalous-dive.glitch.me Open in urlscan Pro
23.22.57.238  Malicious Activity! Public Scan

URL: https://pushy-scandalous-dive.glitch.me/public/zs64hg6098ki.htm
Submission: On July 11 via automatic, source phishtank — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 2 HTTP transactions. The main IP is 23.22.57.238, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is pushy-scandalous-dive.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time pushy-scandalous-dive.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Nationwide Bank (Banking)

Domain & IP information

IP Address AS Autonomous System
1 23.22.57.238 14618 (AMAZON-AES)
1 195.80.159.133 29152 (DECKNET-AS)
2 3
Apex Domain
Subdomains
Transfer
1 l2.io
l2.io — Cisco Umbrella Rank: 265016
229 B
1 glitch.me
pushy-scandalous-dive.glitch.me
831 KB
2 2
Domain Requested by
1 l2.io pushy-scandalous-dive.glitch.me
1 pushy-scandalous-dive.glitch.me
2 2
Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M03
2023-12-04 -
2025-01-01
a year crt.sh
l2.io
R10
2024-07-04 -
2024-10-02
3 months crt.sh

This page contains 1 frames:

Primary Page: https://pushy-scandalous-dive.glitch.me/public/zs64hg6098ki.htm
Frame ID: 6EE778CB85F531838C77AA9D5402F4A8
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

Internet Bank | Login | Nationwide

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

1058 kB
Transfer

1134 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request zs64hg6098ki.htm
pushy-scandalous-dive.glitch.me/public/
829 KB
831 KB
Document
General
Full URL
https://pushy-scandalous-dive.glitch.me/public/zs64hg6098ki.htm
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
23.22.57.238 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-23-22-57-238.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
590d65eaef8ef02772816925868c0961b94213ced0b8952bdadd90905ca628bb

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
849159
content-type
text/html; charset=utf-8
date
Thu, 11 Jul 2024 06:02:32 GMT
etag
"c25828a14a30290fa1652ffa4e30cbd4"
last-modified
Thu, 11 Jul 2024 01:44:10 GMT
server
AmazonS3
x-amz-id-2
MqVWpm2tMUoOE0auEgKPmemKY26iKxQoWpcPpTAgZjSz/afZn30JTF5MvfZC6b3qugDBuzqZvqw=
x-amz-request-id
VMQNKF7Z0D64474B
x-amz-server-side-encryption
AES256
x-amz-version-id
null
ip.js
l2.io/
25 B
229 B
Script
General
Full URL
https://l2.io/ip.js?var=userip
Requested by
Host: pushy-scandalous-dive.glitch.me
URL: https://pushy-scandalous-dive.glitch.me/public/zs64hg6098ki.htm
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_256_GCM
Server
195.80.159.133 , France, ASN29152 (DECKNET-AS, FR),
Reverse DNS
Software
Apache/2.4.38 (Debian) /
Resource Hash
7aedf0518b9fdc979615319ed5922d5cc416a1be1dafea71aa5943c12e365efd

Request headers

Referer
https://pushy-scandalous-dive.glitch.me/
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
Intervention
<https://www.chromestatus.com/feature/5718547946799104>; level="warning"

Response headers

Date
Thu, 11 Jul 2024 06:02:33 GMT
Server
Apache/2.4.38 (Debian)
Connection
Keep-Alive
Keep-Alive
timeout=5, max=100
Content-Length
25
Content-Type
text/html; charset=UTF-8
truncated
/
73 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1179a312fd24a1546386f94b7c744562e65bd1ef8eea12d7d1f4f234289f3bad

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
892ef25d857dbb17c3310310338578e0e19772646435a540fdc717b47979b13b

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
33 KB
33 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
154f369084c28c7ceaf71531663e84382b0f3ac78fffa7f91c4543499b8ee41b

Request headers

Referer
Origin
https://pushy-scandalous-dive.glitch.me
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
application/octet-stream
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f06722cdec025dcab10f4fab41dfd79ffe6a8888d7c7a9ce5efeb86a1170a38b

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
ac07fbf105019336ea0feec19e3ea9ec28557b2748de0a790be3213884bff45c

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/png
truncated
/
161 KB
161 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
c01ee414cef757dfcd67619395a9d6dac513d6eb9fe9baa8d70402d13b2a4647

Request headers

Referer
Origin
https://pushy-scandalous-dive.glitch.me
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
application/octet-stream
truncated
/
32 KB
32 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
5cfc1d72a6c4c817544222468ad1a2f27ed404481f529f223c05c1c52bb3ba2c

Request headers

Referer
Origin
https://pushy-scandalous-dive.glitch.me
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
application/octet-stream

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Nationwide Bank (Banking)

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| savepage_ShadowLoader string| userip function| isNumber

0 Cookies

2 Console Messages

Source Level URL
Text
javascript warning URL: https://pushy-scandalous-dive.glitch.me/public/zs64hg6098ki.htm
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.
javascript warning URL: https://pushy-scandalous-dive.glitch.me/public/zs64hg6098ki.htm
Message:
A parser-blocking, cross site (i.e. different eTLD+1) script, https://l2.io/ip.js?var=userip, is invoked via document.write. The network request for this script MAY be blocked by the browser in this or a future page load due to poor network connectivity. If blocked in this page load, it will be confirmed in a subsequent console message. See https://www.chromestatus.com/feature/5718547946799104 for more details.