newpubg16.dnset.com
Open in
urlscan Pro
95.111.242.214
Malicious Activity!
Public Scan
Submission: On December 07 via manual from GB
Summary
This is the only time newpubg16.dnset.com was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
23 | 95.111.242.214 95.111.242.214 | 51167 (CONTABO) (CONTABO) | |
2 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
3 | 2a02:26f0:f1:... 2a02:26f0:f1::48f7:b338 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 199.232.53.140 199.232.53.140 | 54113 (FASTLY) (FASTLY) | |
29 | 4 |
ASN51167 (CONTABO, DE)
PTR: vmi479620.contaboserver.net
newpubg16.dnset.com |
ASN20446 (HIGHWINDS3, US)
stackpath.bootstrapcdn.com | |
code.jquery.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
23 |
dnset.com
newpubg16.dnset.com |
4 MB |
3 |
pubgmobile.com
www.pubgmobile.com |
158 KB |
1 |
redd.it
i.redd.it |
370 KB |
1 |
jquery.com
code.jquery.com |
30 KB |
1 |
bootstrapcdn.com
stackpath.bootstrapcdn.com |
7 KB |
29 | 5 |
Domain | Requested by | |
---|---|---|
23 | newpubg16.dnset.com |
newpubg16.dnset.com
|
3 | www.pubgmobile.com |
newpubg16.dnset.com
|
1 | i.redd.it |
newpubg16.dnset.com
|
1 | code.jquery.com |
newpubg16.dnset.com
|
1 | stackpath.bootstrapcdn.com |
newpubg16.dnset.com
|
29 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2020-09-22 - 2021-10-12 |
a year | crt.sh |
wetv.acc.qq.com DigiCert Secure Site ECC CA-1 |
2020-09-17 - 2021-04-10 |
7 months | crt.sh |
jquery.org Sectigo RSA Domain Validation Secure Server CA |
2020-10-06 - 2021-10-16 |
a year | crt.sh |
*.redd.it DigiCert SHA2 Secure Server CA |
2020-08-26 - 2021-02-22 |
6 months | crt.sh |
This page contains 1 frames:
Primary Page:
http://newpubg16.dnset.com/
Frame ID: 2C081C85B32AC80D773C5A13AB1C9CED
Requests: 29 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
29 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
newpubg16.dnset.com/ |
6 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
newpubg16.dnset.com/css/ |
14 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.min.css
stackpath.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
loading1.gif
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
26 KB 26 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pubgm.png
newpubg16.dnset.com/img/ |
30 KB 30 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
x.png
newpubg16.dnset.com/img/ |
45 KB 46 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
metroexodus.png
newpubg16.dnset.com/img/ |
23 KB 23 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
banner.png
newpubg16.dnset.com/img/ |
25 KB 25 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1.png
newpubg16.dnset.com/img/reward/ |
157 KB 158 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
2.png
newpubg16.dnset.com/img/reward/ |
150 KB 151 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3.png
newpubg16.dnset.com/img/reward/ |
310 KB 310 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
4.png
newpubg16.dnset.com/img/reward/ |
195 KB 195 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
uc.png
newpubg16.dnset.com/img/ |
18 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
5.png
newpubg16.dnset.com/img/reward/ |
201 KB 201 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6.png
newpubg16.dnset.com/img/reward/ |
196 KB 196 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
7.png
newpubg16.dnset.com/img/reward/ |
227 KB 228 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
8.png
newpubg16.dnset.com/img/reward/ |
122 KB 122 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
facebook_text.png
newpubg16.dnset.com/img/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
icon_logo.jpg
www.pubgmobile.com/id/event/royalepass10/images/ |
73 KB 74 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
twitter_text.png
newpubg16.dnset.com/img/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.js
newpubg16.dnset.com/js/ |
2 KB 929 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pubg.mp4
newpubg16.dnset.com/media/ |
1 MB 1 MB |
Media
video/mp4 |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
5c1t7ymiu1ez.jpg
i.redd.it/ |
369 KB 370 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bg.jpg
newpubg16.dnset.com/img/ |
1 MB 1 MB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
title_bg.png
www.pubgmobile.com/en/event/pubgmxmetro/images/ |
58 KB 58 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
draw.png
newpubg16.dnset.com/img/ |
9 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
pubg.ttf
newpubg16.dnset.com/fonts/ |
58 KB 37 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
spin.mp3
newpubg16.dnset.com/media/ |
64 KB 0 |
Media
audio/mpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)8 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery function| play0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
code.jquery.com
i.redd.it
newpubg16.dnset.com
stackpath.bootstrapcdn.com
www.pubgmobile.com
199.232.53.140
2001:4de0:ac19::1:b:2b
2a02:26f0:f1::48f7:b338
95.111.242.214
092a3cd5f86b3f039feefdeb86694cd16ae545af214cfda614bdbbe2d1bde401
0d9cf7eb8fb12be77685134e63f7dae9a95fbf9306ae0529bd0347582d18a8ef
1be5d05ce6faad469f7f9c5a5879f2d9f8d267b60eb394e92c19217268bcea8f
1f3540f4a9b4f751ff0e2c4d96d8a3d39b8b2d75954e79e4143f5bf90f718a30
298d7759a4d8d20a8b18dd9d33c97406dcfbddc0f0184e71e783d8462d77f99c
39f6289967aa6fa933be519affcd2e4f2ba02bfa9dc318582673099f308e743b
528b28d3e9100df5beae1a8fe6f5961ae109a679d4676fcda5ecc46f6cdd5c85
5a124eef7c85fdc1d1653862b7ca19950013e7ef0da7242eed020b443abc2e93
6dd16e0c328596deea324bd1050239160a8b0c8b9e8fc3e44009e78c2f8211a7
799aeb25cc0373fdee0e1b1db7ad6c2f6a0e058dfadaa3379689f583213190bd
7dab23162a0af0b32df26cb4fdc3beee31fa99555dff523b6828fed0216120c2
84833b9de427cda5ee2f467e47c6eddd6febf1a40a44562e6f6b850a5c84903b
91b8863bc862998d7f3ccea85ead7400e60b2236e1a3228bfd9473299d198eb4
9812cceef5f2cebe8c959be347973708348f32753c407795083861db61e5e38f
9b07523fe5861edc9ecf0347d75f9533f59693e63ce6eb9b257ba4524607349b
9b444a3ae5ecf869fb280732f56174d21ed1a84f54072d71dcb19051faadd232
a7c6b26e3b35f05e200436f5bc285c33cf48967532230898f51c8a056a765db5
af70e63162914b3e46869e66028be251142ac9315b0bf3b55869d457eaa66eb1
b1ccac65c6b185ad0e809bfe0b58075fd1f308200c0334f834e3a8fc981e94b1
b71275cb8140eb119a3f77c3c9f452b833790049b3b14944132c826db7260f9a
c9800443de51602f61a0daad1007873fc698e4e0058efc3bcf53b60c93c66ebc
ca17afb5b8b695ff8877a22861bfe00705b43e08dce79571cd3e3714c908989e
d672eb87a3787bdaf8f75df50f9ade864e2d5c9cdec5b07ce6de9d7d39433ea2
e5deb15013c4682001ba8b4840e5a8474a6515aede7ab773c23a96dbe87812e9
f641c86e2fd4977207f044d47f7cde15eeb5df61ed7eb3ae168df3fdaca2aa5d
f77ce318c1725975d3ea3d0d50536a384687a3e60a257f212c5a002019d1ae95
f7f6a5894f1d19ddad6fa392b2ece2c5e578cbf7da4ea805b6885eb6985b6e3d
fdb83f79799f50312eaed41fb32b893394b6f1dbe37ffd534805f7937fda9bb9