acess-beta-team.ga
Open in
urlscan Pro
2606:4700:3033::6815:5e30
Malicious Activity!
Public Scan
Submission: On May 24 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on May 23rd 2022. Valid for: a year.
This is the only time acess-beta-team.ga was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Discord (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 2606:4700:303... 2606:4700:3033::6815:5e30 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:82f::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 162.159.133.232 162.159.133.232 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
acess-beta-team.ga
acess-beta-team.ga |
2 MB |
1 |
discordapp.net
media.discordapp.net — Cisco Umbrella Rank: 4834 |
13 KB |
1 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 237 |
28 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 46 |
1 KB |
12 | 4 |
Domain | Requested by | |
---|---|---|
9 | acess-beta-team.ga |
acess-beta-team.ga
|
1 | media.discordapp.net |
acess-beta-team.ga
|
1 | cdnjs.cloudflare.com |
acess-beta-team.ga
|
1 | fonts.googleapis.com |
acess-beta-team.ga
|
12 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
discord.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2022-05-23 - 2023-05-22 |
a year | crt.sh |
upload.video.google.com GTS CA 1C3 |
2022-05-04 - 2022-07-27 |
3 months | crt.sh |
discordapp.net Cloudflare Inc ECC CA-3 |
2021-11-03 - 2022-11-02 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://acess-beta-team.ga/
Frame ID: 517236A29EA5C0816481C618F0BF8142
Requests: 12 HTTP requests in this frame
Screenshot
Page Title
Beta | DiscordDetected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- /([\d.]+)/jquery(?:\.min)?\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Forgot your password?
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
acess-beta-team.ga/ |
11 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
style.css
acess-beta-team.ga/source/css/ |
2 MB 274 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css2
fonts.googleapis.com/ |
8 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
62139f1cff10402837062.js
acess-beta-team.ga/source/js/ |
0 0 |
Script
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
antif12.js
acess-beta-team.ga/source/js/ |
1 KB 663 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
cdnjs.cloudflare.com/ajax/libs/jquery/3.3.1/ |
85 KB 28 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bg.png
acess-beta-team.ga/source/img/ |
1 MB 1 MB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
unknown.png
media.discordapp.net/attachments/968639157125677086/969304245797015553/ |
12 KB 13 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
092b071c3b3141a58787415450c27857.png
acess-beta-team.ga/source/img/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
e8acd7d9bf6207f99350ca9f9e23b168.woff
acess-beta-team.ga/assets/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
be0060dafb7a0e31d2a1ca17c0708636.woff
acess-beta-team.ga/assets/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
3bdef1251a424500c1b3a78dea9b7e57.woff
acess-beta-team.ga/assets/ |
0 0 |
Font
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Discord (Instant Messenger)9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone function| getScreenDetails function| $ function| jQuery function| checkpole function| ohmygod function| badgod1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
acess-beta-team.ga/ | Name: PHPSESSID Value: jbb7vlhav562id8ud354rd1ptv |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
acess-beta-team.ga
cdnjs.cloudflare.com
fonts.googleapis.com
media.discordapp.net
162.159.133.232
2606:4700:3033::6815:5e30
2606:4700::6811:180e
2a00:1450:4001:82f::200a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