faint-amusing-workshop.glitch.me Open in urlscan Pro
54.198.39.102  Malicious Activity! Public Scan

Submitted URL: http://megaprintvhsa.com/wp-content/
Effective URL: https://faint-amusing-workshop.glitch.me/
Submission Tags: phishing
Submission: On April 15 via api from US — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 3 domains to perform 2 HTTP transactions. The main IP is 54.198.39.102, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is faint-amusing-workshop.glitch.me.
TLS certificate: Issued by Amazon on February 1st 2022. Valid for: a year.
This is the only time faint-amusing-workshop.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
1 1 162.241.61.43 46606 (UNIFIEDLA...)
1 54.198.39.102 14618 (AMAZON-AES)
1 2a00:1288:80:... 203220 (YAHOO-DEB)
2 3
Apex Domain
Subdomains
Transfer
1 yimg.com
s1.yimg.com — Cisco Umbrella Rank: 50942
3 KB
1 glitch.me
faint-amusing-workshop.glitch.me
47 KB
1 megaprintvhsa.com
megaprintvhsa.com
261 B
2 3
Domain Requested by
1 s1.yimg.com faint-amusing-workshop.glitch.me
1 faint-amusing-workshop.glitch.me
1 megaprintvhsa.com 1 redirects
2 3

This site contains links to these domains. Also see Links.

Domain
www.yahoo.com
help.yahoo.com
login.yahoo.com
legalredirect.yahoo.com
Subject Issuer Validity Valid
glitch.com
Amazon
2022-02-01 -
2023-03-02
a year crt.sh
*.ec.yimg.com
DigiCert SHA2 High Assurance Server CA
2022-02-09 -
2022-05-11
3 months crt.sh

This page contains 1 frames:

Primary Page: https://faint-amusing-workshop.glitch.me/
Frame ID: 39ECF7D9EAA0E03B19DF10918D0E9000
Requests: 3 HTTP requests in this frame

Screenshot

Page Title

Yahoo - login

Page URL History Show full URLs

  1. http://megaprintvhsa.com/wp-content/ HTTP 301
    https://faint-amusing-workshop.glitch.me/ Page URL

Page Statistics

2
Requests

100 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

2
Countries

50 kB
Transfer

50 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://megaprintvhsa.com/wp-content/ HTTP 301
    https://faint-amusing-workshop.glitch.me/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
faint-amusing-workshop.glitch.me/
Redirect Chain
  • http://megaprintvhsa.com/wp-content/
  • https://faint-amusing-workshop.glitch.me/
46 KB
47 KB
Document
General
Full URL
https://faint-amusing-workshop.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
54.198.39.102 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-54-198-39-102.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
86fc862f8ecaf2d3f626a64a4f14b34a70529528f8daec8b4ea42edde71e1b5b

Request headers

Upgrade-Insecure-Requests
1
User-Agent
ia_archiver (+http://www.alexa.com/site/help/webmasters; crawler@alexa.com)
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
47420
content-type
text/html; charset=utf-8
date
Fri, 15 Apr 2022 12:58:24 GMT
etag
"f0b049d1870c875ae033c04b19ebcd8b"
last-modified
Fri, 15 Apr 2022 10:55:19 GMT
server
AmazonS3
x-amz-id-2
/F8MD0TW5UKnYmdXfb5o3tV7s7DZDNzaFl/uRH/7FQSfc4AO9N6RC9iq5F0mcgcXOcAS7aABUzE=
x-amz-request-id
4A0FNPJGMQPG6NF6
x-amz-version-id
MZoU1Tl8uLBBtpAUZjZWUhaUawdqIRRX

Redirect headers

Connection
Keep-Alive
Content-Length
249
Content-Type
text/html; charset=iso-8859-1
Date
Fri, 15 Apr 2022 12:58:23 GMT
Keep-Alive
timeout=5, max=75
Location
https://faint-amusing-workshop.glitch.me/
Server
Apache
yahoo_en-US_f_p_bestfit_2x.png
s1.yimg.com/rz/d/
3 KB
3 KB
Image
General
Full URL
https://s1.yimg.com/rz/d/yahoo_en-US_f_p_bestfit_2x.png
Requested by
Host: faint-amusing-workshop.glitch.me
URL: https://faint-amusing-workshop.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1288:80:807::1 , United Kingdom, ASN203220 (YAHOO-DEB, GB),
Reverse DNS
Software
ATS /
Resource Hash
19b644434cfa9f5d12e1e90a3c2d062aacf27da9ecbe8393df77383ab3c00208
Security Headers
Name Value
Strict-Transport-Security max-age=15552000
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://faint-amusing-workshop.glitch.me/
User-Agent
ia_archiver (+http://www.alexa.com/site/help/webmasters; crawler@alexa.com)

Response headers

date
Thu, 14 Apr 2022 14:35:58 GMT
x-content-type-options
nosniff
age
80547
x-amz-server-side-encryption
AES256
vary
Origin
content-length
3066
x-amz-id-2
z6IjoZg7vwOXwga8ZDjPECr5XpcJpvLHrLe5TpH+PyrMS5DR4b6P3yErXUiI4KWAgg57lM5DoMU=
referrer-policy
no-referrer-when-downgrade
last-modified
Wed, 13 Apr 2022 21:26:50 GMT
server
ATS
etag
"6919fd582e1387e697f8e772008530db"
expect-ct
max-age=31536000, report-uri="http://csp.yahoo.com/beacon/csp?src=yahoocom-expect-ct-report-only"
strict-transport-security
max-age=15552000
x-amz-request-id
3ME6SMMJXCFVPKCG
x-xss-protection
1; mode=block
cache-control
private
accept-ranges
bytes
content-type
image/png
expires
Thu, 14 Apr 2022 23:00:00 GMT
truncated
/
650 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1a540d6790659adf104de6f73b3be7526e1729da358976fa63f366e2ca01c58d

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
ia_archiver (+http://www.alexa.com/site/help/webmasters; crawler@alexa.com)

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Yahoo (Online)

4 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails

0 Cookies