different-pepper-sting.glitch.me Open in urlscan Pro
50.16.150.90  Malicious Activity! Public Scan

URL: http://different-pepper-sting.glitch.me/
Submission: On March 29 via automatic, source phishtank — Scanned from DE

Summary

This website contacted 3 IPs in 2 countries across 2 domains to perform 3 HTTP transactions. The main IP is 50.16.150.90, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is different-pepper-sting.glitch.me.
This is the only time different-pepper-sting.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: AOL (Online) Yahoo (Online)

Domain & IP information

IP Address AS Autonomous System
2 50.16.150.90 14618 (AMAZON-AES)
1 2a02:6ea0:c70... 60068 (CDN77 ^_^)
3 3
Apex Domain
Subdomains
Transfer
2 glitch.me
different-pepper-sting.glitch.me
55 KB
1 icons8.com
img.icons8.com — Cisco Umbrella Rank: 30711
2 KB
3 2
Domain Requested by
2 different-pepper-sting.glitch.me different-pepper-sting.glitch.me
1 img.icons8.com different-pepper-sting.glitch.me
3 2

This site contains no links.

Subject Issuer Validity Valid
1004834818.rsc.cdn77.org
R3
2023-02-18 -
2023-05-19
3 months crt.sh

This page contains 1 frames:

Primary Page: http://different-pepper-sting.glitch.me/
Frame ID: 6F2AA89DB41695AB9EC967635F251B41
Requests: 5 HTTP requests in this frame

Screenshot

Page Title

AOL

Page Statistics

3
Requests

33 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

3
IPs

2
Countries

57 kB
Transfer

73 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
different-pepper-sting.glitch.me/
50 KB
51 KB
Document
General
Full URL
http://different-pepper-sting.glitch.me/
Protocol
HTTP/1.1
Server
50.16.150.90 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-50-16-150-90.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
64db6bddaec23850b2a09b1cd0256d0006313eeac6812286df7d71e48ecebcef

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.110 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

Connection
keep-alive
Content-Length
51509
Content-Type
text/html; charset=utf-8
Date
Wed, 29 Mar 2023 04:50:35 GMT
accept-ranges
bytes
cache-control
no-cache
etag
"14dbf630717798365461529766e9c693"
last-modified
Thu, 14 Jul 2022 10:26:36 GMT
server
AmazonS3
x-amz-id-2
y/qE1YQ+RLNvM1DvT7EcQH4AD2Bv0H2OujoBENhh1nVCzBEKiLqgUqwrTd+S6UtvLeC9v3GHIyQ=
x-amz-request-id
54F1FE133SDYT0RF
x-amz-version-id
FKgGrxeV3tuEOv4yF9lwnIvt1giCTsOR
style.css
different-pepper-sting.glitch.me/
4 KB
5 KB
Stylesheet
General
Full URL
http://different-pepper-sting.glitch.me/style.css
Requested by
Host: different-pepper-sting.glitch.me
URL: http://different-pepper-sting.glitch.me/
Protocol
HTTP/1.1
Server
50.16.150.90 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-50-16-150-90.compute-1.amazonaws.com
Software
AmazonS3 /
Resource Hash
b682e25868088b29ee87376426bccd1172051f4828806a2679dd1138baaf7070

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://different-pepper-sting.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.110 Safari/537.36

Response headers

Date
Wed, 29 Mar 2023 04:50:35 GMT
x-amz-version-id
dHrzg4wz9K2u981q6nFRmskPuNb2Qb96
last-modified
Thu, 14 Jul 2022 10:26:36 GMT
server
AmazonS3
x-amz-request-id
54FAPZV523XT597K
etag
"e721cb74e2fd144c777f54c7f6d40fe4"
Content-Type
text/css; charset=utf-8
cache-control
no-cache
Connection
keep-alive
accept-ranges
bytes
Content-Length
4158
x-amz-id-2
zyfzl+KnAJWYxMcV6bU4jHYpalV5S8Km64iBSNwQco0PDSf7AgVHLA6z5e4jhB5MelJ6IlaW/6ERJlj+sv1+1KbMXM2ghpMCHy9TJrnDjWI=
truncated
/
16 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f3e22262b472ee52e51e9f053856daf9a3f7ce59dd66d51f201f1ee7faaf5690

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://different-pepper-sting.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.110 Safari/537.36

Response headers

Content-Type
image/png
google-logo.png
img.icons8.com/color/50/000000/
1 KB
2 KB
Image
General
Full URL
https://img.icons8.com/color/50/000000/google-logo.png
Requested by
Host: different-pepper-sting.glitch.me
URL: http://different-pepper-sting.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a02:6ea0:c700::11 Frankfurt am Main, Germany, ASN60068 (CDN77 ^_^, GB),
Reverse DNS
Software
CDN77-Turbo /
Resource Hash
1a120e58f75551ccd9d96cdb3c285008a750de5c4eb18b66f2b036a588031955
Security Headers
Name Value
Strict-Transport-Security max-age=15724800; includeSubDomains

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://different-pepper-sting.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.110 Safari/537.36

Response headers

x-77-pop
frankfurtDE
date
Wed, 29 Mar 2023 04:50:35 GMT
strict-transport-security
max-age=15724800; includeSubDomains
version
0.0.29
icon-format
png
x-cache
HIT
x-77-cache
HIT
x-age
215994
content-length
1335
x-77-nzt
AcO1rgVaNuD/uksDAA
x-accel-expires
@1680151841
not-found-platform
false
icon-size
50
last-modified
Fri, 24 Mar 2023 17:24:48
from-mongo-cache
true
server
CDN77-Turbo
x-77-nzt-ray
25b0213156a676399bc323645c90cd20
vary
Origin
from-redis-cache
false
content-type
image/png
access-control-allow-origin
*
cache-control
public, max-age=302400
accept-ranges
bytes
icon-id
17949
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
0fdefe26bac6a6b0b06fe67984582f887af70b7da25d6cb1b401f9074db58338

Request headers

accept-language
de-DE,de;q=0.9
Referer
http://different-pepper-sting.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/111.0.5563.110 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: AOL (Online) Yahoo (Online)

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless

0 Cookies