pubgmexovip.com
Open in
urlscan Pro
2606:4700:3033::6818:7553
Malicious Activity!
Public Scan
Effective URL: https://pubgmexovip.com/
Submission: On December 16 via automatic, source openphish
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on November 26th 2020. Valid for: a year.
This is the only time pubgmexovip.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 21 | 2606:4700:303... 2606:4700:3033::6818:7553 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 209.197.3.15 209.197.3.15 | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
3 | 2a02:26f0:6c0... 2a02:26f0:6c00::210:ba29 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 199.232.53.140 199.232.53.140 | 54113 (FASTLY) (FASTLY) | |
27 | 5 |
ASN20446 (HIGHWINDS3, US)
PTR: vip0x00f.map2.ssl.hwcdn.net
stackpath.bootstrapcdn.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
21 |
pubgmexovip.com
1 redirects
pubgmexovip.com |
3 MB |
3 |
pubgmobile.com
www.pubgmobile.com |
158 KB |
2 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
83 KB |
1 |
redd.it
i.redd.it |
370 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
27 | 5 |
Domain | Requested by | |
---|---|---|
21 | pubgmexovip.com |
1 redirects
pubgmexovip.com
|
3 | www.pubgmobile.com |
pubgmexovip.com
|
2 | stackpath.bootstrapcdn.com |
pubgmexovip.com
stackpath.bootstrapcdn.com |
1 | i.redd.it |
pubgmexovip.com
|
1 | code.jquery.com |
pubgmexovip.com
|
27 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2020-11-26 - 2021-11-25 |
a year | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
wetv.acc.qq.com DigiCert Secure Site ECC CA-1 |
2020-09-17 - 2021-04-10 |
7 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.redd.it DigiCert SHA2 Secure Server CA |
2020-08-26 - 2021-02-22 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://pubgmexovip.com/
Frame ID: 8A0B51F87F730F614E0DA84128545A1D
Requests: 27 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://pubgmexovip.com/
HTTP 301
https://pubgmexovip.com/ Page URL
Detected technologies
CloudFlare (CDN) ExpandDetected patterns
- headers server /^cloudflare$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://pubgmexovip.com/
HTTP 301
https://pubgmexovip.com/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
27 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
pubgmexovip.com/ Redirect Chain
|
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
pubgmexovip.com/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading1.gif
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
26 KB 26 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pubgm.png
pubgmexovip.com/img/ |
30 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
x.png
pubgmexovip.com/img/ |
45 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
metroexodus.png
pubgmexovip.com/img/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
banner.png
pubgmexovip.com/img/ |
83 KB 84 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
1.png
pubgmexovip.com/img/reward/ |
793 KB 794 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.png
pubgmexovip.com/img/reward/ |
433 KB 434 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
3.png
pubgmexovip.com/img/reward/ |
218 KB 218 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
4.png
pubgmexovip.com/img/reward/ |
43 KB 43 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5.png
pubgmexovip.com/img/reward/ |
57 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6.png
pubgmexovip.com/img/reward/ |
201 KB 201 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
facebook_text.png
pubgmexovip.com/img/ |
28 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_logo.jpg
www.pubgmobile.com/id/event/royalepass10/images/ |
73 KB 74 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
twitter_text.png
pubgmexovip.com/img/ |
4 KB 5 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.js
pubgmexovip.com/js/ |
2 KB 872 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pubg.mp4
pubgmexovip.com/media/ |
281 KB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5c1t7ymiu1ez.jpg
i.redd.it/ |
369 KB 370 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg.jpg
pubgmexovip.com/img/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
title_bg.png
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pubg.ttf
pubgmexovip.com/fonts/ |
58 KB 35 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
fontawesome-webfont.woff2
stackpath.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
spin.mp3
pubgmexovip.com/media/ |
84 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pubg.mp4
pubgmexovip.com/media/ |
10 MB 0 |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| play1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.pubgmexovip.com/ | Name: __cfduid Value: d6732961b0e39c819a65187693f8e49a61608125152 |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
i.redd.it
pubgmexovip.com
stackpath.bootstrapcdn.com
www.pubgmobile.com
199.232.53.140
2001:4de0:ac19::1:b:2b
209.197.3.15
2606:4700:3033::6818:7553
2a02:26f0:6c00::210:ba29
092a3cd5f86b3f039feefdeb86694cd16ae545af214cfda614bdbbe2d1bde401
0aecc9efe766679e53118d2ccf9bab4be521c292bac568d3407a735658393355
0d9cf7eb8fb12be77685134e63f7dae9a95fbf9306ae0529bd0347582d18a8ef
1be5d05ce6faad469f7f9c5a5879f2d9f8d267b60eb394e92c19217268bcea8f
2adefcbc041e7d18fcf2d417879dc5a09997aa64d675b7a3c4b6ce33da13f3fe
3334644c9cbb2a97d905bebf8dec277065ba4c6f6b5e97995700a26566b37631
36898e5feb6e0855c31dda4315838d82b60228524c750888e0ead3fdeaaae8f0
39f6289967aa6fa933be519affcd2e4f2ba02bfa9dc318582673099f308e743b
3c0be61785f96ae6f8aeac6ce5ba2671b50621734bb54fa23cec4a5a2d923ff2
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
7dab23162a0af0b32df26cb4fdc3beee31fa99555dff523b6828fed0216120c2
9b07523fe5861edc9ecf0347d75f9533f59693e63ce6eb9b257ba4524607349b
9b444a3ae5ecf869fb280732f56174d21ed1a84f54072d71dcb19051faadd232
b1ccac65c6b185ad0e809bfe0b58075fd1f308200c0334f834e3a8fc981e94b1
b71275cb8140eb119a3f77c3c9f452b833790049b3b14944132c826db7260f9a
be95e873440d54e41e39426d7d941d9049db6be0273a3c9df65082e3c6bb8d67
ca17afb5b8b695ff8877a22861bfe00705b43e08dce79571cd3e3714c908989e
d15cf450e87532ae85b72abc8e53dd3b7846c8bf25f28d989ce8af21a4bc2a68
d1c171b2e82caa4e14749cbcf5c2d74782ebcb859705fb8976495008ede02b81
d672eb87a3787bdaf8f75df50f9ade864e2d5c9cdec5b07ce6de9d7d39433ea2
e7b6d8ad7b8c2396252a352ddb47b004ca6c06dd7d937a4b7615668fbaebaadb
ee469cf7ce539974e5dbe2a3af28aedb2ad31b6bdd976e60b89e9eeb0398e970
f641c86e2fd4977207f044d47f7cde15eeb5df61ed7eb3ae168df3fdaca2aa5d
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d