bwgtrade.store
Open in
urlscan Pro
2a06:6440:0:2d6a::1
Malicious Activity!
Public Scan
Effective URL: https://bwgtrade.store/
Submission Tags: threatview.io malwar3ninja rule: suspected phishing scam automated-submission Search All
Submission: On July 24 via api from DE — Scanned from US
Summary
TLS certificate: Issued by R11 on July 21st 2024. Valid for: 3 months.
This is the only time bwgtrade.store was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
6 | 2a06:6440:0:2... 2a06:6440:0:2d6a::1 | 200000 (UKRAINE-AS) (UKRAINE-AS) | |
1 | 2607:f8b0:400... 2607:f8b0:400d:c09::5f | 15169 (GOOGLE) (GOOGLE) | |
3 | 2607:f8b0:400... 2607:f8b0:400d:c07::5e | 15169 (GOOGLE) (GOOGLE) | |
10 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
bwgtrade.store
bwgtrade.store |
174 KB |
3 |
gstatic.com
fonts.gstatic.com |
47 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 110 |
1 KB |
10 | 3 |
Domain | Requested by | |
---|---|---|
6 | bwgtrade.store |
bwgtrade.store
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
bwgtrade.store
|
10 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
www.bwgtrade.store R11 |
2024-07-21 - 2024-10-19 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-06-24 - 2024-09-16 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-06-24 - 2024-09-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://bwgtrade.store/
Frame ID: C1751F9C5BA4B920635EE59E65886D95
Requests: 10 HTTP requests in this frame
Screenshot
Page Title
Telegram: join channelPage URL History Show full URLs
-
http://bwgtrade.store/
HTTP 307
https://bwgtrade.store/ Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bwgtrade.store/
HTTP 307
https://bwgtrade.store/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
bwgtrade.store/ Redirect Chain
|
4 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
bwgtrade.store/css/ |
5 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
11 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.png
bwgtrade.store/images/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.jpg
bwgtrade.store/images/ |
49 KB 49 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmEU9fBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
16 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tg-day.jpg
bwgtrade.store/images/ |
120 KB 121 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmWUlfBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxK.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.png
bwgtrade.store/images/ |
1 KB 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| updateThemeDisplay function| handleThemeChange function| initThemeListener function| redirectToTG function| redirectToTGChannel function| redirectToBroker0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bwgtrade.store
fonts.googleapis.com
fonts.gstatic.com
2607:f8b0:400d:c07::5e
2607:f8b0:400d:c09::5f
2a06:6440:0:2d6a::1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