www.quizargame.ru
Open in
urlscan Pro
172.67.223.247
Malicious Activity!
Public Scan
Submission: On August 01 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on June 17th 2024. Valid for: 3 months.
This is the only time www.quizargame.ru was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: WeTransfer (Online)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 172.67.223.247 172.67.223.247 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 4 | 2606:4700:10:... 2606:4700:10::ac43:8ee | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 34.198.68.168 34.198.68.168 | 14618 (AMAZON-AES) (AMAZON-AES) | |
17 | 3 |
ASN14618 (AMAZON-AES, US)
PTR: ec2-34-198-68-168.compute-1.amazonaws.com
grizzly-elfin-hotel.glitch.me |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
quizargame.ru
www.quizargame.ru |
81 KB |
4 |
glitch.me
grizzly-elfin-hotel.glitch.me |
469 KB |
4 |
cutt.ly
4 redirects
cutt.ly — Cisco Umbrella Rank: 35981 |
751 B |
0 |
Failed
function sub() { [native code] }. Failed |
|
17 | 4 |
Domain | Requested by | |
---|---|---|
11 | www.quizargame.ru |
www.quizargame.ru
|
4 | grizzly-elfin-hotel.glitch.me |
www.quizargame.ru
|
4 | cutt.ly | 4 redirects |
0 | invalid Failed |
www.quizargame.ru
|
17 | 4 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
quizargame.ru WE1 |
2024-06-17 - 2024-09-15 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://www.quizargame.ru/upload/001/index.html/1.html
Frame ID: 4D981140BA706F2116BC14945FC5E1F0
Requests: 9 HTTP requests in this frame
Frame:
https://www.quizargame.ru/upload/001/index.html/1.html
Frame ID: 791A9B76E93248E2C0479EBCDC9D7E4D
Requests: 8 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 5- https://cutt.ly/CearQTuV HTTP 301
- https://grizzly-elfin-hotel.glitch.me/uiglhijll.css
- https://cutt.ly/OearJLSg HTTP 301
- https://grizzly-elfin-hotel.glitch.me/2.js
- https://cutt.ly/CearQTuV HTTP 301
- https://grizzly-elfin-hotel.glitch.me/uiglhijll.css
- https://cutt.ly/OearJLSg HTTP 301
- https://grizzly-elfin-hotel.glitch.me/2.js
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
1.html
www.quizargame.ru/upload/001/index.html/ |
123 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1.js
www.quizargame.ru/upload/001/index.html/ |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
analytics.js.download
www.quizargame.ru/upload/001/index.html/ |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bWqOLA69nu2fsMi45LjA.js.download
www.quizargame.ru/upload/001/index.html/ |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gtm.js.download
www.quizargame.ru/upload/001/index.html/ |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
invalid/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
uiglhijll.css
grizzly-elfin-hotel.glitch.me/ Redirect Chain
|
391 KB 392 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.js
grizzly-elfin-hotel.glitch.me/ Redirect Chain
|
76 KB 76 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1.html
www.quizargame.ru/upload/001/index.html/ Frame 791A |
123 KB 8 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
1.js
www.quizargame.ru/upload/001/index.html/ Frame 791A |
123 KB 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
analytics.js.download
www.quizargame.ru/upload/001/index.html/ Frame 791A |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bWqOLA69nu2fsMi45LjA.js.download
www.quizargame.ru/upload/001/index.html/ Frame 791A |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
gtm.js.download
www.quizargame.ru/upload/001/index.html/ Frame 791A |
123 KB 8 KB |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
invalid/ Frame 791A |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
uiglhijll.css
grizzly-elfin-hotel.glitch.me/ Frame 791A Redirect Chain
|
391 KB 273 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.js
grizzly-elfin-hotel.glitch.me/ Frame 791A Redirect Chain
|
76 KB 275 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
www.quizargame.ru/ |
15 KB 7 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- invalid
- URL
- chrome-extension://invalid/
- Domain
- invalid
- URL
- chrome-extension://invalid/
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: WeTransfer (Online)14 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| mail function| disableEnterKey function| wccp_free_iscontenteditable function| disable_copy function| disable_copy_ie function| reEnable function| disableSelection function| touchstart function| touchend function| wccp_pro_is_passive function| nocontext function| show_wpcp_message function| hide_message0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cutt.ly
grizzly-elfin-hotel.glitch.me
invalid
www.quizargame.ru
invalid
172.67.223.247
2606:4700:10::ac43:8ee
34.198.68.168
24afbdea262595b870d927d21b61cd535a0346a49dfd164f6198daf0a0a1d84d
7650cccb518dc3993c51d7a477c1676cf331e22856d2a5456178e5dc96f0ac39
7a32a6e4c5e81f0d51cb97466aa442a2342f5ab5c62ff62c3094296fabdda734
861381a33265e42c0c56e9b8d001f174ba61f67f58db518efbe3745ae7089e8f