goofy-pool-appeal.glitch.me
Open in
urlscan Pro
52.3.182.213
Malicious Activity!
Public Scan
Effective URL: https://goofy-pool-appeal.glitch.me/
Submission: On March 10 via manual from FR
Summary
TLS certificate: Issued by Amazon on January 18th 2021. Valid for: a year.
This is the only time goofy-pool-appeal.glitch.me was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Facebook (Social Network)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 2 | 148.224.96.115 148.224.96.115 | 28414 (TOTAL PLA...) (TOTAL PLAY TELECOMUNICACIONES SA DE CV) | |
2 | 52.3.182.213 52.3.182.213 | 14618 (AMAZON-AES) (AMAZON-AES) | |
1 | 2606:4700::68... 2606:4700::6810:125e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 3 | 50.31.177.9 50.31.177.9 | 23352 (SERVERCEN...) (SERVERCENTRAL) | |
1 | 67.202.114.212 67.202.114.212 | 32748 (STEADFAST) (STEADFAST) | |
6 | 5 |
ASN28414 (TOTAL PLAY TELECOMUNICACIONES SA DE CV, MX)
PTR: 115-96-static.uaslp.mx
a.uaslp.mx |
ASN14618 (AMAZON-AES, US)
PTR: ec2-52-3-182-213.compute-1.amazonaws.com
goofy-pool-appeal.glitch.me |
ASN23352 (SERVERCENTRAL, US)
PTR: single-4786.banahosting.com
appmultit.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
appmultit.com
1 redirects
appmultit.com |
500 KB |
2 |
glitch.me
goofy-pool-appeal.glitch.me |
5 KB |
2 |
uaslp.mx
2 redirects
a.uaslp.mx |
395 B |
1 |
amung.us
whos.amung.us |
26 B |
1 |
cloudflare.com
cdnjs.cloudflare.com |
3 KB |
6 | 5 |
Domain | Requested by | |
---|---|---|
3 | appmultit.com |
1 redirects
goofy-pool-appeal.glitch.me
|
2 | goofy-pool-appeal.glitch.me |
goofy-pool-appeal.glitch.me
|
2 | a.uaslp.mx | 2 redirects |
1 | whos.amung.us | |
1 | cdnjs.cloudflare.com |
goofy-pool-appeal.glitch.me
|
6 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
glitch.com Amazon |
2021-01-18 - 2022-02-15 |
a year | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-10-21 - 2021-10-20 |
a year | crt.sh |
appmultit.com cPanel, Inc. Certification Authority |
2021-02-22 - 2021-05-23 |
3 months | crt.sh |
whos.amung.us Sectigo RSA Domain Validation Secure Server CA |
2020-05-21 - 2022-05-21 |
2 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://goofy-pool-appeal.glitch.me/
Frame ID: 3694C6E607AF261A3C0317A5FF347AB5
Requests: 8 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://a.uaslp.mx/Ci9e2PEz
HTTP 302
https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez HTTP 302
https://goofy-pool-appeal.glitch.me/ Page URL
- https://goofy-pool-appeal.glitch.me/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://a.uaslp.mx/Ci9e2PEz
HTTP 302
https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez HTTP 302
https://goofy-pool-appeal.glitch.me/ Page URL
- https://goofy-pool-appeal.glitch.me/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://a.uaslp.mx/Ci9e2PEz HTTP 302
- https://a.uaslp.mx/Redireccion.aspx?pagina=ci9e2pez HTTP 302
- https://goofy-pool-appeal.glitch.me/
- https://appmultit.com/location HTTP 301
- https://appmultit.com/location/
6 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
goofy-pool-appeal.glitch.me/ Redirect Chain
|
5 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bowser.min.js
cdnjs.cloudflare.com/ajax/libs/bowser/1.9.4/ |
8 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
goofy-pool-appeal.glitch.me/ |
123 B 302 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
appmultit.com/ |
717 KB 499 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3-Q050 |
/
appmultit.com/location/ Redirect Chain
|
1 KB 527 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
whos.amung.us/pingjs/ |
26 B 26 B |
Image
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
51 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Facebook (Social Network)25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated string| back boolean| ignoreHistoryChange boolean| ignoreHashChange boolean| IS_MOBILE number| limit_bot string| object string| type string| OUTPUT object| ___ object| params number| tt undefined| to_object string| a function| checking function| creatingInput function| searchingForms0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a.uaslp.mx
appmultit.com
cdnjs.cloudflare.com
goofy-pool-appeal.glitch.me
whos.amung.us
148.224.96.115
2606:4700::6810:125e
50.31.177.9
52.3.182.213
67.202.114.212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