rohitxdata.bloodynoon.com
Open in
urlscan Pro
2606:4700:3033::ac43:94c8
Malicious Activity!
Public Scan
Submission: On August 20 via automatic, source openphish — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on June 24th 2023. Valid for: 3 months.
This is the only time rohitxdata.bloodynoon.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2606:4700:303... 2606:4700:3033::ac43:94c8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:bcf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 162.19.58.158 162.19.58.158 | 16276 (OVH) (OVH) | |
2 | 2.19.126.202 2.19.126.202 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2a00:1450:400... 2a00:1450:4001:80f::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 2a00:1450:400... 2a00:1450:4001:810::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 | 65.21.235.194 65.21.235.194 | 24940 (HETZNER-AS) (HETZNER-AS) | |
22 | 11 |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a2-19-126-202.deploy.static.akamaitechnologies.com
www.battlegroundsmobileindia.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
bloodynoon.com
rohitxdata.bloodynoon.com |
48 KB |
4 |
ibb.co
i.ibb.co — Cisco Umbrella Rank: 11172 |
238 KB |
3 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 73 ajax.googleapis.com — Cisco Umbrella Rank: 424 |
60 KB |
2 |
battlegroundsmobileindia.com
www.battlegroundsmobileindia.com |
37 KB |
1 |
top4top.io
l.top4top.io a.top4top.io Failed |
20 KB |
1 |
gstatic.com
fonts.gstatic.com |
15 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 985 |
32 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 277 |
6 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com — Cisco Umbrella Rank: 3131 |
7 KB |
22 | 9 |
Domain | Requested by | |
---|---|---|
7 | rohitxdata.bloodynoon.com |
rohitxdata.bloodynoon.com
|
4 | i.ibb.co |
rohitxdata.bloodynoon.com
|
2 | ajax.googleapis.com |
rohitxdata.bloodynoon.com
|
2 | www.battlegroundsmobileindia.com |
rohitxdata.bloodynoon.com
|
1 | l.top4top.io | |
1 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | code.jquery.com |
rohitxdata.bloodynoon.com
|
1 | fonts.googleapis.com |
rohitxdata.bloodynoon.com
|
1 | cdnjs.cloudflare.com |
rohitxdata.bloodynoon.com
|
1 | stackpath.bootstrapcdn.com |
rohitxdata.bloodynoon.com
|
0 | a.top4top.io Failed | |
22 | 11 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bloodynoon.com GTS CA 1P5 |
2023-06-24 - 2023-09-22 |
3 months | crt.sh |
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-12-30 - 2023-12-30 |
a year | crt.sh |
ibb.co R3 |
2023-08-10 - 2023-11-08 |
3 months | crt.sh |
h5.battlegroundsmobileindia.com DigiCert TLS RSA SHA256 2020 CA1 |
2023-07-09 - 2024-07-09 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2023-07-31 - 2023-10-23 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
*.gstatic.com GTS CA 1C3 |
2023-07-31 - 2023-10-23 |
3 months | crt.sh |
*.top4top.co R3 |
2023-08-01 - 2023-10-30 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://rohitxdata.bloodynoon.com/
Frame ID: E291820B2477B764EDD993DB2ABF0BCF
Requests: 22 HTTP requests in this frame
Screenshot
Page Title
BATTLEGROUNDS MOBILE INDIADetected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
animate.css (Web Frameworks) Expand
Detected patterns
- <link [^>]+(?:/([\d.]+)/)?animate\.(?:min\.)?css
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
22 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
rohitxdata.bloodynoon.com/ |
23 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
rohitxdata.bloodynoon.com/css/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
animate.css
rohitxdata.bloodynoon.com/css/ |
59 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
facebook.css
rohitxdata.bloodynoon.com/css/login/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
twitter.css
rohitxdata.bloodynoon.com/css/login/ |
2 KB 870 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
material-design-iconic-font.min.css
cdnjs.cloudflare.com/ajax/libs/material-design-iconic-font/2.2.0/css/ |
69 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Picsart-23-02-06-00-36-02-317.png
i.ibb.co/1Z4ZZ9M/ |
196 KB 196 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
footerlg.png
www.battlegroundsmobileindia.com/common/img/common/ |
7 KB 7 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
facebook-text.png
i.ibb.co/Wg8qQxh/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
app.png
www.battlegroundsmobileindia.com/common/img/main/ |
29 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
twitter-text.png
i.ibb.co/V9rgBqw/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
rocket-loader.min.js
rohitxdata.bloodynoon.com/cdn-cgi/scripts/7d0fa10a/cloudflare-static/ |
12 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
11 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.3/ |
82 KB 30 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
ajax.googleapis.com/ajax/libs/jquery/2.1.1/ |
82 KB 29 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-1.10.2.min.js
code.jquery.com/ |
91 KB 32 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
container.jpg
rohitxdata.bloodynoon.com/img/ |
28 KB 29 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
IMG-20220608-090738-172.jpg
i.ibb.co/sRkC09K/ |
8 KB 8 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
LYjNdG7kmE0gfaN9pQ.woff2
fonts.gstatic.com/s/teko/v18/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
m_1725u5z7i1.mp3
l.top4top.io/ |
19 KB 20 KB |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
m_1725zobal2.mp3
a.top4top.io/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- a.top4top.io
- URL
- https://a.top4top.io/m_1725zobal2.mp3
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)19 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| documentPictureInPicture object| __cfQR function| $ function| jQuery object| buka object| tutup function| openRewards function| open_itemReward_confirmation function| open_otherReward_confirmation function| open_account_login function| open_facebook function| open_twitter function| close_reward_confirmation function| tutup_facebook function| tutup_twitter function| ValidateLoginFbData function| ValidateLoginTwitterData function| ValidateVerificationData boolean| __cfRLUnblockHandlers0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
a.top4top.io
ajax.googleapis.com
cdnjs.cloudflare.com
code.jquery.com
fonts.googleapis.com
fonts.gstatic.com
i.ibb.co
l.top4top.io
rohitxdata.bloodynoon.com
stackpath.bootstrapcdn.com
www.battlegroundsmobileindia.com
a.top4top.io
162.19.58.158
2.19.126.202
2001:4de0:ac18::1:a:2a
2606:4700:3033::ac43:94c8
2606:4700::6811:180e
2606:4700::6812:bcf
2a00:1450:4001:80f::200a
2a00:1450:4001:810::2003
2a00:1450:4001:830::200a
65.21.235.194
092a3cd5f86b3f039feefdeb86694cd16ae545af214cfda614bdbbe2d1bde401
0ba081f546084bd5097aa8a73c75931d5aa1fc4d6e846e53c21f98e6a1509988
101f99a620d8c282356ed03a2908f9c2f5517479e55649ed316b4fe244849306
1be5d05ce6faad469f7f9c5a5879f2d9f8d267b60eb394e92c19217268bcea8f
24360f378669757464e7d21d136f8119fa4f5065580e5937a31d5532e0a547bb
44237a2a364f912f2684bbc1f448c8fe1b948756785b8cc6201340ce0d511300
49992ecbf7cfd2699670e3f0e5cd55ab9583ccc214f84fcbc6ab9e4e61b81a77
4bc5852e5cec62ceab9260f712961f59609868151e01b63e7b7cae2b00efed54
68a9e792632f03e41178368df343fc95b45e46f981b7a49a3feb69c70f37601c
714088bef569d6981bfae79530ef315f4d6505f302a944ce9063601919977e6f
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
874706b2b1311a0719b5267f7d1cf803057e367e94ae1ff7bf78c5450d30f5d4
8af93bd675e1cfd9ecc850e862819fdac6e3ad1f5d761f970e409c7d9c63bdc3
8fce2cab2eb55065e9cca8bbf72667662b27de4d938178c8658808550fe30a43
9907c43a3d8eb5f8ef2cbea20501bff285319021d1dc691f255f648b884baada
ae436385b07376ad4950398bc206fe04f5de8c36e00b17aac330b5bd6622d671
ccf00d1923b0131a10e0c6d26f95e5dee6ebf8621a27e83c5a2f68a2e0093142
d16065e6930fb910ad230fd89fe1d1b66d5803ee34eb291ed244d618af9e3c55
dec3e9f0190a504ed0c8f4a5e957c107206ba106cac4a1bbb6cbac6369a16d56
e85ade5d6786ebf81122a53e42d731a33edf5368d8b18e8dc397c0fbf06b9268
eda901ae59aa8595e3beb351c85b95e308b04c24426e485697495d8622ccfceb