scandalous-big-open.glitch.me Open in urlscan Pro
184.72.189.252  Malicious Activity! Public Scan

Submitted URL: http://scandalous-big-open.glitch.me/auto.html
Effective URL: https://scandalous-big-open.glitch.me/auto.html
Submission: On September 21 via automatic, source openphish — Scanned from DE

Summary

This website contacted 5 IPs in 3 countries across 4 domains to perform 10 HTTP transactions. The main IP is 184.72.189.252, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is scandalous-big-open.glitch.me.
TLS certificate: Issued by Amazon RSA 2048 M03 on December 4th 2023. Valid for: a year.
This is the only time scandalous-big-open.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Trustwallet (Crypto) Coinbase (Crypto Exchange)

Domain & IP information

IP Address AS Autonomous System
2 184.72.189.252 14618 (AMAZON-AES)
2 2a00:1450:400... 15169 (GOOGLE)
4 46.105.222.162 16276 (OVH)
1 2a00:1450:400... 15169 (GOOGLE)
10 5
Apex Domain
Subdomains
Transfer
4 postimg.cc
i.postimg.cc — Cisco Umbrella Rank: 18635
175 KB
2 googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 32
2 KB
2 glitch.me
scandalous-big-open.glitch.me
8 KB
1 gstatic.com
fonts.gstatic.com
18 KB
10 4
Domain Requested by
4 i.postimg.cc scandalous-big-open.glitch.me
2 fonts.googleapis.com scandalous-big-open.glitch.me
2 scandalous-big-open.glitch.me
1 fonts.gstatic.com fonts.googleapis.com
10 4

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon RSA 2048 M03
2023-12-04 -
2025-01-01
a year crt.sh
upload.video.google.com
WR2
2024-08-26 -
2024-11-18
3 months crt.sh
postimg.cc
E5
2024-08-21 -
2024-11-19
3 months crt.sh
*.gstatic.com
WR2
2024-08-26 -
2024-11-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://scandalous-big-open.glitch.me/auto.html
Frame ID: D56D80EFB2072889999759CA5D8312EA
Requests: 10 HTTP requests in this frame

Screenshot

Page Title

info

Page URL History Show full URLs

  1. http://scandalous-big-open.glitch.me/auto.html HTTP 307
    https://scandalous-big-open.glitch.me/auto.html Page URL

Page Statistics

10
Requests

90 %
HTTPS

50 %
IPv6

4
Domains

4
Subdomains

5
IPs

3
Countries

204 kB
Transfer

208 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://scandalous-big-open.glitch.me/auto.html HTTP 307
    https://scandalous-big-open.glitch.me/auto.html Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request auto.html
scandalous-big-open.glitch.me/
Redirect Chain
  • http://scandalous-big-open.glitch.me/auto.html
  • https://scandalous-big-open.glitch.me/auto.html
4 KB
4 KB
Document
General
Full URL
https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
184.72.189.252 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-184-72-189-252.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
fe9886a7534cddc2236138f1f9e7ef7d511e5ba639178220e6db63ecb5bdc901

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Response headers

accept-ranges
bytes
cache-control
no-cache
content-length
3624
content-type
text/html; charset=utf-8
date
Sat, 21 Sep 2024 14:15:49 GMT
etag
"421ec27f6d7b51883a99822d57362381"
last-modified
Sun, 15 Sep 2024 00:19:57 GMT
server
AmazonS3
x-amz-id-2
bv0/qsM76Qo9t+RkyqU2/LQvbde8ISmjOpEZqW7ebKhcjAw4SuMc0vdyGMJFnkglyqWqanPpEJo=
x-amz-request-id
H3SEC5HMH504VP88
x-amz-server-side-encryption
AES256
x-amz-version-id
iyCNmCTvbIeepiyvDwu_JhmqWNTHdDD3

Redirect headers

Location
https://scandalous-big-open.glitch.me/auto.html
Non-Authoritative-Reason
HttpsUpgrades
css2
fonts.googleapis.com/
2 KB
849 B
Stylesheet
General
Full URL
https://fonts.googleapis.com/css2?family=DM+Sans:wght@400;500;700&display=swap
Requested by
Host: scandalous-big-open.glitch.me
URL: https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
492d00e4a4110b712efd91a46f205045b2f207df8bc960be6f46b0964107f7cd
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/

Response headers

content-encoding
gzip
x-content-type-options
nosniff
expires
Sat, 21 Sep 2024 14:15:49 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 21 Sep 2024 14:15:49 GMT
content-type
text/css; charset=utf-8
last-modified
Sat, 21 Sep 2024 12:54:34 GMT
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
x-xss-protection
0
server
ESF
css
fonts.googleapis.com/
6 KB
2 KB
Stylesheet
General
Full URL
https://fonts.googleapis.com/css?family=Open+Sans
Requested by
Host: scandalous-big-open.glitch.me
URL: https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2a00:1450:4001:81c::200a Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
ESF /
Resource Hash
c3061c3788ad5783ef8a5d10c454bafe7eb942c48200dccc852cc6d3c9f303d4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/

Response headers

content-encoding
gzip
x-content-type-options
nosniff
expires
Sat, 21 Sep 2024 14:15:49 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Sat, 21 Sep 2024 14:15:49 GMT
content-type
text/css; charset=utf-8
last-modified
Sat, 21 Sep 2024 13:50:55 GMT
x-frame-options
SAMEORIGIN
strict-transport-security
max-age=31536000
link
<https://fonts.gstatic.com>; rel=preconnect; crossorigin
cache-control
private, max-age=86400, stale-while-revalidate=604800
timing-allow-origin
*
cross-origin-opener-policy
same-origin-allow-popups
cross-origin-resource-policy
cross-origin
access-control-allow-origin
*
x-xss-protection
0
server
ESF
lodf.png
i.postimg.cc/KcJh5d8T/
5 KB
5 KB
Image
General
Full URL
https://i.postimg.cc/KcJh5d8T/lodf.png
Requested by
Host: scandalous-big-open.glitch.me
URL: https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.105.222.162 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3236472.ip-46-105-222.eu
Software
openresty /
Resource Hash
47f11b95f73135f7bc623be4083187d4d6343d17f9672214515576be46f81fdf

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/

Response headers

cache-control
max-age=315360000, public
access-control-allow-methods
GET, OPTIONS
expires
Thu, 31 Dec 2037 23:55:55 GMT
accept-ranges
bytes
access-control-allow-origin
*
content-length
4966
date
Sat, 21 Sep 2024 14:15:49 GMT
content-type
image/png
last-modified
Thu, 07 Mar 2024 12:34:11 GMT
server
openresty
ents.png
i.postimg.cc/y8z12w3J/
58 KB
58 KB
Image
General
Full URL
https://i.postimg.cc/y8z12w3J/ents.png
Requested by
Host: scandalous-big-open.glitch.me
URL: https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.105.222.162 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3236472.ip-46-105-222.eu
Software
openresty /
Resource Hash
82c9139c3b633aa13219e17e7bf63c5d4f95292ebffe3e7fca8f174e8ca30b3e

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/

Response headers

cache-control
max-age=315360000, public
access-control-allow-methods
GET, OPTIONS
expires
Thu, 31 Dec 2037 23:55:55 GMT
accept-ranges
bytes
access-control-allow-origin
*
content-length
59561
date
Sat, 21 Sep 2024 14:15:49 GMT
content-type
image/png
last-modified
Thu, 07 Mar 2024 13:13:16 GMT
server
openresty
seps.png
i.postimg.cc/zGjwF0cB/
54 KB
55 KB
Image
General
Full URL
https://i.postimg.cc/zGjwF0cB/seps.png
Requested by
Host: scandalous-big-open.glitch.me
URL: https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.105.222.162 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3236472.ip-46-105-222.eu
Software
openresty /
Resource Hash
6497ba6f1ea322123029052050f3cc3178be7934362e3d9b332431a3cba8b4bf

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/

Response headers

cache-control
max-age=315360000, public
access-control-allow-methods
GET, OPTIONS
expires
Thu, 31 Dec 2037 23:55:55 GMT
accept-ranges
bytes
access-control-allow-origin
*
content-length
55544
date
Sat, 21 Sep 2024 14:15:49 GMT
content-type
image/png
last-modified
Thu, 07 Mar 2024 13:25:14 GMT
server
openresty
tok.png
i.postimg.cc/V6yNrcWb/
0
0

memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
fonts.gstatic.com/s/opensans/v40/
18 KB
18 KB
Font
General
Full URL
https://fonts.gstatic.com/s/opensans/v40/memSYaGs126MiZpBA-UvWbX2vVnXBbObj2OVZyOOSr4dVJWUgsjZ0B4gaVI.woff2
Requested by
Host: fonts.googleapis.com
URL: https://fonts.googleapis.com/css?family=Open+Sans
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2a00:1450:4001:80e::2003 Frankfurt am Main, Germany, ASN15169 (GOOGLE, US),
Reverse DNS
Software
sffe /
Resource Hash
e7af9d60d875eb1c1b1037bbbfdec41fcb096d0ebcf98a48717ad8b07906ced6
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Origin
https://scandalous-big-open.glitch.me
Referer
https://fonts.googleapis.com/

Response headers

age
354808
report-to
{"group":"apps-themes","max_age":2592000,"endpoints":[{"url":"https://csp.withgoogle.com/csp/report-to/apps-themes"}]}
x-content-type-options
nosniff
expires
Wed, 17 Sep 2025 11:42:21 GMT
alt-svc
h3=":443"; ma=2592000,h3-29=":443"; ma=2592000
date
Tue, 17 Sep 2024 11:42:21 GMT
last-modified
Thu, 14 Dec 2023 02:00:39 GMT
content-type
font/woff2
cache-control
public, max-age=31536000
timing-allow-origin
*
cross-origin-opener-policy
same-origin; report-to="apps-themes"
cross-origin-resource-policy
cross-origin
content-security-policy-report-only
require-trusted-types-for 'script'; report-uri https://csp.withgoogle.com/csp/apps-themes
accept-ranges
bytes
access-control-allow-origin
*
content-length
18668
x-xss-protection
0
server
sffe
tok.png
i.postimg.cc/V6yNrcWb/
57 KB
57 KB
Image
General
Full URL
https://i.postimg.cc/V6yNrcWb/tok.png
Requested by
Host: scandalous-big-open.glitch.me
URL: https://scandalous-big-open.glitch.me/auto.html
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
46.105.222.162 , France, ASN16276 (OVH, FR),
Reverse DNS
ns3236472.ip-46-105-222.eu
Software
openresty /
Resource Hash
66ab896095eccacb8caf2edb5d80f0323bfcb1f7959a070ea5c35f5da108406d

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/

Response headers

cache-control
max-age=315360000, public
access-control-allow-methods
GET, OPTIONS
expires
Thu, 31 Dec 2037 23:55:55 GMT
accept-ranges
bytes
access-control-allow-origin
*
content-length
58469
date
Sat, 21 Sep 2024 14:15:49 GMT
content-type
image/png
last-modified
Thu, 07 Mar 2024 13:26:56 GMT
server
openresty
favicon.ico
scandalous-big-open.glitch.me/
4 KB
4 KB
Other
General
Full URL
https://scandalous-big-open.glitch.me/favicon.ico
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
184.72.189.252 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-184-72-189-252.compute-1.amazonaws.com
Software
/
Resource Hash
2784f6ffefbd5fcae302d112e1629907deed1e36f9c2050ea6d7038eec3f649c

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://scandalous-big-open.glitch.me/auto.html

Response headers

date
Sat, 21 Sep 2024 14:15:49 GMT
cache-control
max-age=0
content-length
3674

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
i.postimg.cc
URL
https://i.postimg.cc/V6yNrcWb/tok.png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Trustwallet (Crypto) Coinbase (Crypto Exchange)

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://scandalous-big-open.glitch.me/favicon.ico
Message:
Failed to load resource: the server responded with a status of 404 ()