pubg-event-free.bwoajt.cf
Open in
urlscan Pro
2a06:98c1:3120::3
Malicious Activity!
Public Scan
Submission: On July 17 via api from US — Scanned from NL
Summary
This is the only time pubg-event-free.bwoajt.cf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 3.64.163.50 3.64.163.50 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:808::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 51.210.32.132 51.210.32.132 | 16276 (OVH) (OVH) | |
5 | 2a02:26f0:f7:... 2a02:26f0:f7::5c7b:e150 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a00:1450:400... 2a00:1450:4001:80f::2003 | 15169 (GOOGLE) (GOOGLE) | |
42 | 9 |
ASN16509 (AMAZON-02, US)
PTR: ec2-3-64-163-50.eu-central-1.compute.amazonaws.com
jefanya.com |
ASN20940 (AKAMAI-ASN1, NL)
www.pubgmobile.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
bwoajt.cf
pubg-event-free.bwoajt.cf |
133 KB |
5 |
pubgmobile.com
www.pubgmobile.com — Cisco Umbrella Rank: 24673 |
580 KB |
4 |
jefanya.com
jefanya.com |
318 B |
1 |
gstatic.com
fonts.gstatic.com |
14 KB |
1 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 12327 |
323 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 258 |
6 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 81 |
930 B |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 2503 |
7 KB |
42 | 8 |
Domain | Requested by | |
---|---|---|
15 | pubg-event-free.bwoajt.cf |
pubg-event-free.bwoajt.cf
|
5 | www.pubgmobile.com |
pubg-event-free.bwoajt.cf
|
4 | jefanya.com |
pubg-event-free.bwoajt.cf
|
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | i.ibb.co |
pubg-event-free.bwoajt.cf
|
1 | cdnjs.cloudflare.com |
pubg-event-free.bwoajt.cf
|
1 | fonts.googleapis.com |
pubg-event-free.bwoajt.cf
|
1 | stackpath.bootstrapcdn.com |
pubg-event-free.bwoajt.cf
|
42 | 8 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jefanya.com R3 |
2022-07-15 - 2022-10-13 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-01-29 - 2023-01-29 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-06-27 - 2022-09-19 |
3 months | crt.sh |
ibb.co R3 |
2022-06-07 - 2022-09-05 |
3 months | crt.sh |
wetv.acc.qq.com DigiCert SHA2 Secure Server CA |
2022-05-26 - 2023-01-17 |
8 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2022-06-27 - 2022-09-19 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://pubg-event-free.bwoajt.cf/
Frame ID: E05FD1ADCB3A3369941E95BBDAC3B1FD
Requests: 42 HTTP requests in this frame
Screenshot
Page Title
PUBG MOBILE - GRAFFITIPRANKDetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
42 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
pubg-event-free.bwoajt.cf/ |
23 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
debug.js
jefanya.com/js/ |
0 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebook.css
pubg-event-free.bwoajt.cf/css-zone/ |
3 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
twitter.css
pubg-event-free.bwoajt.cf/css-zone/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
1 KB 930 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
material-design-iconic-font.min.css
cdnjs.cloudflare.com/ajax/libs/material-design-iconic-font/2.2.0/css/ |
69 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.js
pubg-event-free.bwoajt.cf/js-zone/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-zone.js
pubg-event-free.bwoajt.cf/js-zone/ |
610 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main-zone.js.download
pubg-event-free.bwoajt.cf/index_files/ |
610 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
pubg-event-free.bwoajt.cf/index_files/ |
61 KB 61 KB |
Stylesheet
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pubgm.png
jefanya.com/data/PUBG%20SPIN%20V10/ |
106 B 106 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
season.png
i.ibb.co/RcHkpZ5/ |
322 KB 323 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
metroexodus.png
jefanya.com/data/PUBG%20SPIN%20V10/ |
106 B 106 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
jefanya.com/data/PUBG%20SPIN%20V10/reward/ |
106 B 106 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
2.png
jefanya.com/data/PUBG%20SPIN%20V10/reward/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
3.png
jefanya.com/data/PUBG%20SPIN%20V10/reward/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
4.png
jefanya.com/data/PUBG%20SPIN%20V10/reward/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
5.png
jefanya.com/data/PUBG%20SPIN%20V10/reward/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
6.png
jefanya.com/data/PUBG%20SPIN%20V10/reward/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
putar.png
jefanya.com/data/PUBG%20SPIN%20V10/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foot_logo1.png
www.pubgmobile.com/common/images/ |
36 KB 36 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foot_logo2.png
www.pubgmobile.com/common/images/ |
59 KB 60 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
foot_logo3.png
www.pubgmobile.com/common/images/ |
84 KB 85 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js.download
pubg-event-free.bwoajt.cf/index_files/ |
85 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
gift-zone.js
pubg-event-free.bwoajt.cf/index_files/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slide-zone.js
pubg-event-free.bwoajt.cf/js-zone/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slide-zone.js.download
pubg-event-free.bwoajt.cf/index_files/ |
2 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
facebook_text.png
jefanya.com/data/PUBG%20SPIN%20V10/login/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_logo.jpg
www.pubgmobile.com/id/event/royalepass10/images/ |
73 KB 74 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
twitter_text.png
jefanya.com/data/PUBG%20SPIN%20V10/login/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alert-zone.js
pubg-event-free.bwoajt.cf/js-zone/ |
118 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zero-zone.js
pubg-event-free.bwoajt.cf/js-zone/ |
861 B 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style-zone.css
pubg-event-free.bwoajt.cf/css-zone/ |
18 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
zero-zone.css
pubg-event-free.bwoajt.cf/css-zone/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg_1.jpg
www.pubgmobile.com/en/event/graffitiprank/images/ |
325 KB 326 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
subheader.png
jefanya.com/data/PUBG%20SPIN%20V10/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
container.png
jefanya.com/data/PUBG%20SPIN%20V10/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
spin.png
jefanya.com/data/PUBG%20SPIN%20V10/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LYjNdG7kmE0gfaN9pQ.woff2
fonts.gstatic.com/s/teko/v15/ |
13 KB 14 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
pubg.mp4
jefanya.com/data/PUBG%20SPIN%20V10/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
putar.mp3
jefanya.com/data/PUBG%20SPIN%20V10/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/reward/2.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/reward/3.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/reward/4.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/reward/5.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/reward/6.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/putar.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/login/facebook_text.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/login/twitter_text.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/subheader.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/container.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/spin.png
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/pubg.mp4
- Domain
- jefanya.com
- URL
- https://jefanya.com/data/PUBG%20SPIN%20V10/putar.mp3
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)41 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation object| shortcut object| _0xc9be function| ls function| log function| conf object| _0xd4d3 object| _0x1679 object| _0x17ac function| zonehost object| _0xc160 function| setImmediate function| clearImmediate function| swal function| sweetAlert object| _0xd626 function| $ function| jQuery object| _0x66b7 function| runCircle function| generatePrizeNumber function| controllSpeed function| init function| openHero object| _0xd52e number| slideIndex function| showSlides function| close_open_rewards function| open_account_login function| close_account_login function| open_facebook function| open_twitter function| close_facebook function| close_twitter function| spin function| klik10 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
17 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
i.ibb.co
jefanya.com
pubg-event-free.bwoajt.cf
stackpath.bootstrapcdn.com
www.pubgmobile.com
jefanya.com
2606:4700::6811:180e
2606:4700::6812:bcf
2a00:1450:4001:808::200a
2a00:1450:4001:80f::2003
2a02:26f0:f7::5c7b:e150
2a06:98c1:3120::3
3.64.163.50
51.210.32.132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