violations-forms.glitch.me Open in urlscan Pro
52.55.211.28  Malicious Activity! Public Scan

URL: http://violations-forms.glitch.me/
Submission: On December 10 via api from US — Scanned from US

Summary

This website contacted 3 IPs in 1 countries across 3 domains to perform 4 HTTP transactions. The main IP is 52.55.211.28, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is violations-forms.glitch.me.
This is the only time violations-forms.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
1 52.55.211.28 14618 (AMAZON-AES)
1 2607:f8b0:400... 15169 (GOOGLE)
2 151.101.2.132 54113 (FASTLY)
4 3
Apex Domain
Subdomains
Transfer
2 glitch.global
cdn.glitch.global — Cisco Umbrella Rank: 153726
97 KB
1 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29
1 KB
1 glitch.me
violations-forms.glitch.me
5 KB
4 3
Domain Requested by
2 cdn.glitch.global violations-forms.glitch.me
1 fonts.googleapis.com violations-forms.glitch.me
1 violations-forms.glitch.me
4 3

This site contains no links.

Subject Issuer Validity Valid
upload.video.google.com
GTS CA 1C3
2023-11-20 -
2024-02-12
3 months crt.sh
cdn.glitch.global
R3
2023-12-02 -
2024-03-01
3 months crt.sh

This page contains 1 frames:

Primary Page: http://violations-forms.glitch.me/
Frame ID: D5C22DACA86939527F3E499966D94FF7
Requests: 4 HTTP requests in this frame

Screenshot

Page Title

Facebook - warning

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com

Page Statistics

4
Requests

75 %
HTTPS

33 %
IPv6

3
Domains

3
Subdomains

3
IPs

1
Countries

103 kB
Transfer

106 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

4 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
violations-forms.glitch.me/
5 KB
5 KB
Document
General
Full URL
http://violations-forms.glitch.me/
Protocol
HTTP/1.1
Server
52.55.211.28 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-55-211-28.compute-1.amazonaws.com
Software
/ PHP/7.0.33-0ubuntu0.16.04.16
Resource Hash
e1e10cd66ac2de25eacebfe88e125b4610ef3c3bb59eed8cceaa282dc4bb8c1c

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36
accept-language
en-US,en;q=0.9

Response headers

Connection
keep-alive
Content-Type
text/html; charset=UTF-8
Date
Sun, 10 Dec 2023 15:15:31 GMT
Transfer-Encoding
chunked
host
violations-forms.glitch.me
x-powered-by
PHP/7.0.33-0ubuntu0.16.04.16
css2
fonts.googleapis.com/
4 KB
1 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=Roboto:wght@400;700&display=swap
Requested by
Host: violations-forms.glitch.me
URL: http://violations-forms.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2607:f8b0:4006:823::200a , United States, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
2d0922bd18f06df3c7413fcd6a3f1c5ec9545b4b07b131e362f30df7275fc058
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

accept-language
en-US,en;q=0.9
Referer
http://violations-forms.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36

Response headers

strict-transport-security
max-age=31536000
date
Sun, 10 Dec 2023 15:15:31 GMT
content-encoding
gzip
x-content-type-options
nosniff
cross-origin-resource-policy
cross-origin
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
x-xss-protection
0
last-modified
Sun, 10 Dec 2023 14:21:28 GMT
server
ESF
cross-origin-opener-policy
same-origin-allow-popups
x-frame-options
SAMEORIGIN
content-type
text/css; charset=utf-8
access-control-allow-origin
*
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
expires
Sun, 10 Dec 2023 15:15:31 GMT
icon.png
cdn.glitch.global/0e876aa8-70cf-40f1-951b-94c8002e5dcc/
78 KB
78 KB
Image
General
Full URL
https://cdn.glitch.global/0e876aa8-70cf-40f1-951b-94c8002e5dcc/icon.png?v=1699082922949
Requested by
Host: violations-forms.glitch.me
URL: http://violations-forms.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.132 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
4c5e70219e34e87735a3b1b930dd0ae8e344bef36b1732780d8a2ac0571c0be7
Security Headers
Name Value
Content-Security-Policy script-src 'none'

Request headers

accept-language
en-US,en;q=0.9
Referer
http://violations-forms.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36

Response headers

content-security-policy
script-src 'none'
via
1.1 varnish, 1.1 varnish
date
Sun, 10 Dec 2023 15:15:31 GMT
x-amz-request-id
ATPJ1C1EQPP9MJTB
age
2090177
x-amz-server-side-encryption
AES256
x-cache
HIT, HIT
content-length
79439
x-amz-id-2
ubdFHY9lB3qBldUPq+1Lk+Ju8vhNGyrS7C+AZEoWOGWfwm0prUl3yHBi4fsl5DscJ64EdHvzV5M=
x-served-by
cache-iad-kcgs7200070-IAD, cache-mia-kmia1760035-MIA
last-modified
Sat, 04 Nov 2023 07:28:43 GMT
server
AmazonS3
x-timer
S1702221332.561516,VS0,VE2
etag
"84669eb4301059aa602096c83a13e15f"
access-control-allow-methods
GET, HEAD, POST
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
x-cache-hits
698, 1
thumbnails%2Fbluetick.png
cdn.glitch.global/0e876aa8-70cf-40f1-951b-94c8002e5dcc/
19 KB
19 KB
Image
General
Full URL
https://cdn.glitch.global/0e876aa8-70cf-40f1-951b-94c8002e5dcc/thumbnails%2Fbluetick.png?1699082922610
Requested by
Host: violations-forms.glitch.me
URL: http://violations-forms.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
151.101.2.132 , United States, ASN54113 (FASTLY, US),
Reverse DNS
Software
AmazonS3 /
Resource Hash
6c91e4f82ff598b2ac2aae3e6d19e2e2d30946097d7a7040870028b4489b7e4e
Security Headers
Name Value
Content-Security-Policy script-src 'none'

Request headers

accept-language
en-US,en;q=0.9
Referer
http://violations-forms.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.71 Safari/537.36

Response headers

content-security-policy
script-src 'none'
via
1.1 varnish, 1.1 varnish
date
Sun, 10 Dec 2023 15:15:31 GMT
x-amz-request-id
DWB6CB7Y8W7Q9JB3
age
860952
x-amz-server-side-encryption
AES256
x-cache
HIT, HIT
content-length
19417
x-amz-id-2
JXBx+b9pyLOzl7CcmIohzYyXlGHSjp17JIc/G9WYCBlwr/WPwLLKeumY9wRljYInWCHqzTlrIJA=
x-served-by
cache-iad-kiad7000132-IAD, cache-mia-kmia1760035-MIA
last-modified
Sat, 04 Nov 2023 07:28:43 GMT
server
AmazonS3
x-timer
S1702221332.561525,VS0,VE4
etag
"c46d520b7be409ba634453a7a7ce0e00"
access-control-allow-methods
GET, HEAD, POST
content-type
image/png
access-control-allow-origin
*
cache-control
max-age=31536000
accept-ranges
bytes
x-cache-hits
256, 1

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies