goofy-pool-appeal.glitch.me Open in urlscan Pro
52.3.182.213  Malicious Activity! Public Scan

Submitted URL: http://a.uaslp.mx/Ci9e2PEz
Effective URL: https://goofy-pool-appeal.glitch.me/
Submission: On March 10 via manual from FR

Summary

This website contacted 5 IPs in 2 countries across 5 domains to perform 6 HTTP transactions. The main IP is 52.3.182.213, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is goofy-pool-appeal.glitch.me.
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time goofy-pool-appeal.glitch.me was scanned on urlscan.io!

urlscan.io Verdict: Potentially Malicious

Targeting these brands: Facebook (Social Network)

Domain & IP information

IP Address AS Autonomous System
2 2 148.224.96.115 28414 (TOTAL PLA...)
2 52.3.182.213 14618 (AMAZON-AES)
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 3 50.31.177.9 23352 (SERVERCEN...)
1 67.202.114.212 32748 (STEADFAST)
6 5
Apex Domain
Subdomains
Transfer
3 appmultit.com
appmultit.com
500 KB
2 glitch.me
goofy-pool-appeal.glitch.me
5 KB
2 uaslp.mx
a.uaslp.mx
395 B
1 amung.us
whos.amung.us
26 B
1 cloudflare.com
cdnjs.cloudflare.com
3 KB
6 5
Domain Requested by
3 appmultit.com 1 redirects goofy-pool-appeal.glitch.me
2 goofy-pool-appeal.glitch.me goofy-pool-appeal.glitch.me
2 a.uaslp.mx 2 redirects
1 whos.amung.us
1 cdnjs.cloudflare.com goofy-pool-appeal.glitch.me
6 5

This site contains no links.

Subject Issuer Validity Valid
glitch.com
Amazon
2021-01-18 -
2022-02-15
a year crt.sh
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2020-10-21 -
2021-10-20
a year crt.sh
appmultit.com
cPanel, Inc. Certification Authority
2021-02-22 -
2021-05-23
3 months crt.sh
whos.amung.us
Sectigo RSA Domain Validation Secure Server CA
2020-05-21 -
2022-05-21
2 years crt.sh

This page contains 1 frames:

Primary Page: https://goofy-pool-appeal.glitch.me/
Frame ID: 3694C6E607AF261A3C0317A5FF347AB5
Requests: 8 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. http://a.uaslp.mx/Ci9e2PEz HTTP 302
    https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez HTTP 302
    https://goofy-pool-appeal.glitch.me/ Page URL
  2. https://goofy-pool-appeal.glitch.me/ Page URL

Page Statistics

6
Requests

100 %
HTTPS

20 %
IPv6

5
Domains

5
Subdomains

5
IPs

2
Countries

508 kB
Transfer

783 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://a.uaslp.mx/Ci9e2PEz HTTP 302
    https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez HTTP 302
    https://goofy-pool-appeal.glitch.me/ Page URL
  2. https://goofy-pool-appeal.glitch.me/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

Request Chain 0
  • http://a.uaslp.mx/Ci9e2PEz HTTP 302
  • https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez HTTP 302
  • https://goofy-pool-appeal.glitch.me/
Request Chain 3
  • https://appmultit.com/location HTTP 301
  • https://appmultit.com/location/

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
goofy-pool-appeal.glitch.me/
Redirect Chain
  • http://a.uaslp.mx/Ci9e2PEz
  • https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez
  • https://goofy-pool-appeal.glitch.me/
5 KB
5 KB
Document
General
Full URL
https://goofy-pool-appeal.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.182.213 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-3-182-213.compute-1.amazonaws.com
Software
/
Resource Hash
5d8edd3ed4fb5886041f0b87a376a55473fdbc1ffc9bff08f4e3ee715a88fddf

Request headers

:method
GET
:authority
goofy-pool-appeal.glitch.me
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 10 Mar 2021 21:13:20 GMT
cache-control
no-cache

Redirect headers

cache-control
private
content-type
text/html; charset=utf-8
location
https://goofy-pool-appeal.glitch.me
server
Microsoft-IIS/10.0
set-cookie
ASP.NET_SessionId=aptqyqb45yua23slrqca5luz; path=/; HttpOnly
x-aspnet-version
4.0.30319
x-powered-by
ASP.NET
date
Wed, 10 Mar 2021 21:13:03 GMT
content-length
152
bowser.min.js
cdnjs.cloudflare.com/ajax/libs/bowser/1.9.4/
8 KB
3 KB
Script
General
Full URL
https://cdnjs.cloudflare.com/ajax/libs/bowser/1.9.4/bowser.min.js
Requested by
Host: goofy-pool-appeal.glitch.me
URL: https://goofy-pool-appeal.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6810:125e , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
b52f6b6011741e76cefa2be41164bbc9b33bba334b9ad15b03abad37b609d983
Security Headers
Name Value
Strict-Transport-Security max-age=15780000
X-Content-Type-Options nosniff

Request headers

Referer
https://goofy-pool-appeal.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 10 Mar 2021 21:13:20 GMT
content-encoding
br
x-content-type-options
nosniff
cf-cache-status
HIT
nel
{"report_to":"cf-nel","max_age":604800}
age
1805648
cross-origin-resource-policy
cross-origin
alt-svc
h3-27=":443"; ma=86400, h3-28=":443"; ma=86400, h3-29=":443"; ma=86400
content-length
2561
cf-request-id
08bf95c0c100004dd625130000000001
timing-allow-origin
*
last-modified
Mon, 04 May 2020 16:06:40 GMT
server
cloudflare
cf-cdnjs-via
cfworker/kv
etag
"5eb03d90-1edd"
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
strict-transport-security
max-age=15780000
report-to
{"max_age":604800,"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report?s=GWw8V%2FpWMtNo7hJbzX4MuAUGzxgpkwDkPyEocMdT2aE4ttjqwg%2FkkkakdV9CFqsSbd668G9%2FXPdom29s%2BS0mSmx1ogrqz5Ao8vp4KbGXRYLaaV%2BzzYIrrlSaMoXJP1UhKA%3D%3D"}],"group":"cf-nel"}
content-type
application/javascript; charset=utf-8
access-control-allow-origin
*
vary
Accept-Encoding
cache-control
public, max-age=30672000
accept-ranges
bytes
cf-ray
62df8be13bd54dd6-FRA
expires
Mon, 28 Feb 2022 21:13:20 GMT
Primary Request /
goofy-pool-appeal.glitch.me/
123 B
302 B
Document
General
Full URL
https://goofy-pool-appeal.glitch.me/
Requested by
Host: goofy-pool-appeal.glitch.me
URL: https://goofy-pool-appeal.glitch.me/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
52.3.182.213 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-3-182-213.compute-1.amazonaws.com
Software
/
Resource Hash
fd22d0fa5bc48e1a9663868fbed67fe1f4e63dd347f4b8011ce8657977fa12c7

Request headers

:method
GET
:authority
goofy-pool-appeal.glitch.me
:scheme
https
:path
/
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
same-origin
sec-fetch-mode
navigate
sec-fetch-dest
document
referer
https://goofy-pool-appeal.glitch.me/
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Referer
https://goofy-pool-appeal.glitch.me/

Response headers

date
Wed, 10 Mar 2021 21:13:26 GMT
content-type
text/html; charset=utf-8
content-length
123
vary
Origin
accept-ranges
bytes
last-modified
Wed, 10 Mar 2021 19:38:43 GMT
cache-control
max-age=0
etag
W/"7b-1781da605b8"
/
appmultit.com/
717 KB
499 KB
Script
General
Full URL
https://appmultit.com/?api=1&lan=fbnormal&ht=1&counter0=trab02
Requested by
Host: goofy-pool-appeal.glitch.me
URL: https://goofy-pool-appeal.glitch.me/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
50.31.177.9 , United States, ASN23352 (SERVERCENTRAL, US),
Reverse DNS
single-4786.banahosting.com
Software
/
Resource Hash
34127f6ff4bde7d54e68ae416ba6bdec4a955ce3c21997b8ceb219d32f29115f

Request headers

Referer
https://goofy-pool-appeal.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

pragma
no-cache
date
Wed, 10 Mar 2021 21:13:27 GMT
content-encoding
br
vary
Accept-Encoding
content-type
application/javascript
cache-control
no-store, no-cache, must-revalidate
alt-svc
quic=":443"; ma=2592000; v="43,46", h3-Q043=":443"; ma=2592000, h3-Q046=":443"; ma=2592000, h3-Q050=":443"; ma=2592000, h3-25=":443"; ma=2592000, h3-27=":443"; ma=2592000
expires
Thu, 19 Nov 1981 08:52:00 GMT
/
appmultit.com/location/
Redirect Chain
  • https://appmultit.com/location
  • https://appmultit.com/location/
1 KB
527 B
Script
General
Full URL
https://appmultit.com/location/
Protocol
H3-Q050
Security
QUIC, , AES_128_GCM
Server
50.31.177.9 , United States, ASN23352 (SERVERCENTRAL, US),
Reverse DNS
single-4786.banahosting.com
Software
/
Resource Hash
d9228dbd9373b96940ab6c39715ffe39f9fc02bc7da5db0df44dd1fd83c52794

Request headers

Referer
https://goofy-pool-appeal.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 10 Mar 2021 21:13:28 GMT
content-encoding
br
expires
Wed, 17 Mar 2021 21:13:28 GMT
cache-control
public, max-age=604800
content-length
434
vary
Accept-Encoding
content-type
application/javascript

Redirect headers

location
https://appmultit.com/location/
date
Wed, 10 Mar 2021 21:13:28 GMT
content-length
707
content-type
text/html
truncated
/
1 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
1230532f79456753fb73f559ece9b95c17cfb36325dc313a3eda5ac22dfd9a2b

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png
/
whos.amung.us/pingjs/
26 B
26 B
Image
General
Full URL
https://whos.amung.us/pingjs/?k=trab02&t=Amung&c=s&x=https://whos.amung.us/&y=https://whos.amung.us/&a=-1&d=0&v=27&r=1954
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
67.202.114.212 , United States, ASN32748 (STEADFAST, US),
Reverse DNS
amung.us
Software
/
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
https://goofy-pool-appeal.glitch.me/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

date
Wed, 10 Mar 2021 21:13:28 GMT
content-encoding
gzip
content-type
text/javascript;charset=UTF-8
truncated
/
51 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7281941fed81ed9caf5728727e05da4a94b442c36796e1a5b1d6106f242ed11f

Request headers

Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!

urlscan

Phishing against: Facebook (Social Network)

25 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated string| back boolean| ignoreHistoryChange boolean| ignoreHashChange boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt undefined| to_object string| a function| checking function| creatingInput function| searchingForms

0 Cookies

2 Console Messages

Source Level URL
Text
console-api log URL: https://appmultit.com/?api=1&lan=fbnormal&ht=1&counter0=trab02(Line 101)
Message:
[object HTMLScriptElement]
console-api log URL: https://appmultit.com/?api=1&lan=fbnormal&ht=1&counter0=trab02(Line 101)
Message:
[object HTMLScriptElement]