ehrggtup.monster
Open in
urlscan Pro
2606:4700:3036::ac43:975e
Malicious Activity!
Public Scan
Submission: On December 09 via api from RU — Scanned from DE
Summary
TLS certificate: Issued by WE1 on December 4th 2024. Valid for: 3 months.
This is the only time ehrggtup.monster was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 15 | 2606:4700:303... 2606:4700:3036::ac43:975e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2606:4700:303... 2606:4700:3031::ac43:9f3f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
28 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
ehrggtup.monster
1 redirects
ehrggtup.monster |
395 KB |
3 |
bafanglaicai.app
tian.bafanglaicai.app |
4 KB |
28 | 2 |
Domain | Requested by | |
---|---|---|
15 | ehrggtup.monster |
1 redirects
ehrggtup.monster
|
3 | tian.bafanglaicai.app |
ehrggtup.monster
tian.bafanglaicai.app |
28 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
ehrggtup.monster WE1 |
2024-12-04 - 2025-03-04 |
3 months | crt.sh |
bafanglaicai.app WE1 |
2024-10-22 - 2025-01-20 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://ehrggtup.monster/
Frame ID: 0B628ADC318F624B7BE4539FC19D0000
Requests: 21 HTTP requests in this frame
Frame:
https://ehrggtup.monster/cdn-cgi/challenge-platform/h/g/scripts/jsd/f9063374b04d/main.js
Frame ID: D3D9B4CDB5026B471AD43F48AB6AA5C7
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 10- https://ehrggtup.monster/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://ehrggtup.monster/cdn-cgi/challenge-platform/h/g/scripts/jsd/f9063374b04d/main.js
28 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
ehrggtup.monster/ |
13 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.4d7bc528ef300bb77a47.css
ehrggtup.monster/ |
405 KB 87 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
style-desktop.7ec8ed3b19fabb19d057.css
ehrggtup.monster/ |
338 B 932 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
mtproto.worker.ae3e8dc772cae8b81c0e.chunk.js
ehrggtup.monster/ |
742 KB 203 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
85.205de0b3350ad6e5100a.bundle.js
ehrggtup.monster/ |
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
116.34cfd7ff5c594baefb32.bundle.js
ehrggtup.monster/ |
24 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.e909e0d1fb62ea42e9d0.bundle.js
ehrggtup.monster/ |
83 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
script.js
tian.bafanglaicai.app/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
crypto.worker.1addef60de53de89c181.chunk.js
ehrggtup.monster/ |
24 KB 10 KB |
Fetch
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
mtproto.worker.ae3e8dc772cae8b81c0e.chunk.js
ehrggtup.monster/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
crypto.worker.1addef60de53de89c181.chunk.js
ehrggtup.monster/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
ehrggtup.monster/cdn-cgi/challenge-platform/h/g/scripts/jsd/f9063374b04d/ Frame D3D9 Redirect Chain
|
9 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
send
tian.bafanglaicai.app/api/ |
599 B 1 KB |
Fetch
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H3 |
send
tian.bafanglaicai.app/api/ Frame |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
ehrggtup.monster/assets/img/ |
15 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
104.b23fc99c0ad8aab75e1a.chunk.js
ehrggtup.monster/ |
69 KB 23 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
301.057f4a981945e824c78f.chunk.js
ehrggtup.monster/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
8.228cb76ce437b01a2aeb.chunk.js
ehrggtup.monster/ |
24 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8ef5ca84ac849b3f
ehrggtup.monster/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame D3D9 |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
41.6ab156a3a39d7a08893f.chunk.js
ehrggtup.monster/ |
35 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
480.e548ea77058f9dac9735.chunk.js
ehrggtup.monster/ |
1 MB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
709.ae8e0000f4edcfe60aba.chunk.js
ehrggtup.monster/ |
5 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
aecf618d-6d60-47bd-83ba-729bba0113eb
https://ehrggtup.monster/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
4325d3f7-051a-4d9a-a0d8-7d97c968cc0a
https://ehrggtup.monster/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
67eacd99-0cad-47ae-baf5-cf6b30af0b0c
https://ehrggtup.monster/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
npm.qr-code-styling.f8f57a1c721e03c3f699.chunk.js
ehrggtup.monster/ |
64 KB 0 |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
810.f6d94fc8d0635364313b.chunk.js
ehrggtup.monster/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo_padded.svg
ehrggtup.monster/assets/img/ |
1 KB 0 |
Fetch
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
1 KB 0 |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- ehrggtup.monster
- URL
- https://ehrggtup.monster/mtproto.worker.ae3e8dc772cae8b81c0e.chunk.js
- Domain
- ehrggtup.monster
- URL
- https://ehrggtup.monster/crypto.worker.1addef60de53de89c181.chunk.js
- Domain
- ehrggtup.monster
- URL
- blob:https://ehrggtup.monster/aecf618d-6d60-47bd-83ba-729bba0113eb
- Domain
- ehrggtup.monster
- URL
- blob:https://ehrggtup.monster/4325d3f7-051a-4d9a-a0d8-7d97c968cc0a
- Domain
- ehrggtup.monster
- URL
- blob:https://ehrggtup.monster/67eacd99-0cad-47ae-baf5-cf6b30af0b0c
- Domain
- ehrggtup.monster
- URL
- https://ehrggtup.monster/810.f6d94fc8d0635364313b.chunk.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)58 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| webpackChunktweb object| rootScope function| AppStorage object| stateStorage function| wrapUrl object| I18n object| webpWorkerController object| appStorage object| singleInstance object| webPushApiManager object| telegramMeWebManager object| opusDecodeController object| cryptoMessagePort object| mtprotoMessagePort object| serviceMessagePort object| apiManagerProxy function| calcImageInBox object| mediaSizes object| customProperties object| themeController function| formatDateAccordingToTodayNew function| fillTipDates object| umami function| dispatchHeavyAnimationEvent object| sequentialDom object| appDownloadManager object| appMediaPlaybackController object| appNavigationController object| liteMode object| windowSize function| getVisibleRect function| generatePathData function| p function| putPreloader function| getRichValueWithCaret function| compareNodes function| placeCaretAtEnd function| PopupNewMedia function| SlicedArray function| ScrollSaver object| internalLinkProcessor object| emoticonsDropdown object| appSidebarRight function| getStream function| getStreamCached object| groupCallController object| callsController object| appDialogsManager object| appSidebarLeft object| uiNotificationsManager object| appImManager object| syncedPlayers object| emojiRenderers function| wrapRichText object| animationIntersector object| lottieLoader object| pagesManager1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.ehrggtup.monster/ | Name: cf_clearance Value: n786JlA7zFbAVvqSzLMa0sejN85vi41mPIdnUqikcRQ-1733755655-1.2.1.1-sw41UdulB5iQsopQnlbG8gHEPNAw1n8IUbO6twvjMm5zN_kNnuu9N8qzPUr4Pxq3yPY40dJjIRmMSfhh7nV8Js3xAlMynW0.hTaBFHFBO68PxqHxJv1u6ocGzht1UEP4kf1hT1EgDVBeNUvF8gfSLY4hOt1x9Y48tIg9Y91SjLF1FKDDSzfHM0wh3NvAAmwHxNEIEp.0cLvTIUiBX_MH_N4wZzj_3p_RRPUYe4qoVbPa43iHBOtfZv_dn.jfx4CXkuO40uVB1WOgvJmnHfxJtguOOcqQAGMD6bs9BMm0QvT4g24GVrNYnUHczTpRgTZ40HNPv1vXlD2I2V4BvNGv_O.xELJxn8AJ6TvGRXei.q9osvS4Xh7X5ExoewmXTd9O |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ehrggtup.monster
tian.bafanglaicai.app
ehrggtup.monster
2606:4700:3031::ac43:9f3f
2606:4700:3036::ac43:975e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