royaleeliteplus.com
Open in
urlscan Pro
144.91.105.130
Malicious Activity!
Public Scan
Submission: On December 01 via api from DE
Summary
TLS certificate: Issued by cPanel, Inc. Certification Authority on November 20th 2020. Valid for: 3 months.
This is the only time royaleeliteplus.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
19 | 144.91.105.130 144.91.105.130 | 51167 (CONTABO) (CONTABO) | |
4 | 2a02:26f0:6c0... 2a02:26f0:6c00::210:ba0b | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:1b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 199.232.53.140 199.232.53.140 | 54113 (FASTLY) (FASTLY) | |
26 | 5 |
ASN51167 (CONTABO, DE)
PTR: vmi478908.contaboserver.net
royaleeliteplus.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
19 |
royaleeliteplus.com
royaleeliteplus.com |
5 MB |
4 |
pubgmobile.com
www.pubgmobile.com |
173 KB |
1 |
redd.it
i.redd.it |
370 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
0 |
bootstrapcdn.com
Failed
stackpath.bootstrapcdn.com Failed |
|
26 | 5 |
Domain | Requested by | |
---|---|---|
19 | royaleeliteplus.com |
royaleeliteplus.com
|
4 | www.pubgmobile.com |
royaleeliteplus.com
|
1 | i.redd.it |
royaleeliteplus.com
|
1 | code.jquery.com |
royaleeliteplus.com
|
0 | stackpath.bootstrapcdn.com Failed |
royaleeliteplus.com
|
26 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
royaleeliteplus.com cPanel, Inc. Certification Authority |
2020-11-20 - 2021-02-18 |
3 months | crt.sh |
wetv.acc.qq.com DigiCert Secure Site ECC CA-1 |
2020-09-17 - 2021-04-10 |
7 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.redd.it DigiCert SHA2 Secure Server CA |
2020-08-26 - 2021-02-22 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://royaleeliteplus.com/
Frame ID: 2E17D37F31D6B1C4DABD531B6C4640C7
Requests: 26 HTTP requests in this frame
Screenshot
Detected technologies
Apache (Web Servers) ExpandDetected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
26 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
royaleeliteplus.com/ |
6 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
royaleeliteplus.com/css/ |
13 KB 14 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading1.gif
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
26 KB 26 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pubgm.png
royaleeliteplus.com/img/ |
30 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
x.png
royaleeliteplus.com/img/ |
45 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
metroexodus.png
royaleeliteplus.com/img/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner.png
royaleeliteplus.com/img/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
royaleeliteplus.com/img/reward/ |
399 KB 400 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
royaleeliteplus.com/img/reward/ |
443 KB 444 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
royaleeliteplus.com/img/reward/ |
401 KB 401 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
royaleeliteplus.com/img/reward/ |
310 KB 310 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
royaleeliteplus.com/img/reward/ |
370 KB 370 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
royaleeliteplus.com/img/reward/ |
117 KB 118 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebook_text.png
royaleeliteplus.com/img/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_logo.jpg
www.pubgmobile.com/id/event/royalepass10/images/ |
73 KB 74 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
twitter_text.png
royaleeliteplus.com/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.js
royaleeliteplus.com/js/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pubg.mp4
royaleeliteplus.com/media/ |
1 MB 1 MB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5c1t7ymiu1ez.jpg
i.redd.it/ |
369 KB 370 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
royaleeliteplus.com/img/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
title_bg.png
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tab4.png
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
15 KB 15 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pubg.ttf
royaleeliteplus.com/fonts/ |
58 KB 58 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spin.mp3
royaleeliteplus.com/media/ |
64 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- stackpath.bootstrapcdn.com
- URL
- https://stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/font-awesome.min.css
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker object| trustedTypes boolean| crossOriginIsolated0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
i.redd.it
royaleeliteplus.com
stackpath.bootstrapcdn.com
www.pubgmobile.com
stackpath.bootstrapcdn.com
144.91.105.130
199.232.53.140
2001:4de0:ac19::1:b:1b
2a02:26f0:6c00::210:ba0b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