bqweasfxtc.cyou
Open in
urlscan Pro
2606:4700:3035::ac43:b193
Malicious Activity!
Public Scan
Effective URL: https://bqweasfxtc.cyou/k/
Submission: On December 25 via api from IE — Scanned from US
Summary
TLS certificate: Issued by WE1 on December 23rd 2024. Valid for: 3 months.
This is the only time bqweasfxtc.cyou was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Telegram (Instant Messenger)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 2606:4700:303... 2606:4700:3035::ac43:b193 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
bqweasfxtc.cyou
1 redirects
bqweasfxtc.cyou |
81 KB |
17 | 1 |
Domain | Requested by | |
---|---|---|
13 | bqweasfxtc.cyou |
1 redirects
bqweasfxtc.cyou
|
17 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
core.telegram.org |
Subject Issuer | Validity | Valid | |
---|---|---|---|
bqweasfxtc.cyou WE1 |
2024-12-23 - 2025-03-23 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://bqweasfxtc.cyou/k/
Frame ID: 06132B62E4A7A782B2B7901B9AE778A5
Requests: 11 HTTP requests in this frame
Frame:
https://bqweasfxtc.cyou/cdn-cgi/challenge-platform/h/b/scripts/jsd/787bc399e22f/main.js
Frame ID: 60E7B6043518437DE4DAE964A8FFE7A2
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Telegram SupportPage URL History Show full URLs
-
http://bqweasfxtc.cyou/
HTTP 307
https://bqweasfxtc.cyou/ Page URL
- https://bqweasfxtc.cyou/k/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: API
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://bqweasfxtc.cyou/
HTTP 307
https://bqweasfxtc.cyou/ Page URL
- https://bqweasfxtc.cyou/k/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- http://bqweasfxtc.cyou/ HTTP 307
- https://bqweasfxtc.cyou/
- https://bqweasfxtc.cyou/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://bqweasfxtc.cyou/cdn-cgi/challenge-platform/h/b/scripts/jsd/787bc399e22f/main.js
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
/
bqweasfxtc.cyou/ Redirect Chain
|
14 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
bqweasfxtc.cyou/files/ |
42 KB 10 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
index.css
bqweasfxtc.cyou/ |
1 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
telegram.css
bqweasfxtc.cyou/files/ |
113 KB 28 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
i18n.js
bqweasfxtc.cyou/js/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
bqweasfxtc.cyou/files/ |
21 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
tgsticker.js
bqweasfxtc.cyou/files/ |
24 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
t_logo_sprite.svg
bqweasfxtc.cyou/img/ |
23 KB 7 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
tgsticker-worker.js
bqweasfxtc.cyou/js/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
bqweasfxtc.cyou/cdn-cgi/challenge-platform/h/b/scripts/jsd/787bc399e22f/ Frame 60E7 Redirect Chain
|
9 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8f7903684b2a439c
bqweasfxtc.cyou/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame 60E7 |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
bqweasfxtc.cyou/files/img/ |
15 KB 4 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
tgsticker-worker.js
bqweasfxtc.cyou/js/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
tgsticker-worker.js
bqweasfxtc.cyou/js/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
tgsticker-worker.js
bqweasfxtc.cyou/js/ Frame |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
Primary Request
/
bqweasfxtc.cyou/k/ |
3 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
redirect.js
bqweasfxtc.cyou/k/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- bqweasfxtc.cyou
- URL
- https://bqweasfxtc.cyou/js/tgsticker-worker.js
- Domain
- bqweasfxtc.cyou
- URL
- https://bqweasfxtc.cyou/js/tgsticker-worker.js
- Domain
- bqweasfxtc.cyou
- URL
- https://bqweasfxtc.cyou/js/tgsticker-worker.js
- Domain
- bqweasfxtc.cyou
- URL
- https://bqweasfxtc.cyou/js/tgsticker-worker.js
- Domain
- bqweasfxtc.cyou
- URL
- https://bqweasfxtc.cyou/k/redirect.js
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Telegram (Instant Messenger)49 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| updateLanguage number| startTime function| dT object| jsonpCallbacks function| twitterCustomShareInit function| blogRecentNewsInit function| blogSideImageUpdate function| blogSideImageInit function| cancelEvent function| trackDlClick function| backToTopInit function| backToTopGo function| backToTopResize function| backToTopScroll function| removePreloadInit function| getXY function| dropdownClick function| dropdownHide function| dropdownPageClick function| escapeHTML function| videoTogglePlay function| getDevPageNav function| showTitleIfOverflows function| initDevPageNav function| updateDevPageNav function| updateMenuAffix function| initScrollVideos function| checkScrollVideos function| videoPreloadPosterDimensions function| isVisibleEnough function| getFullOffsetY function| redraw function| initRipple function| mainInitRetinaVideos function| mainInitDemoAutoplay function| mainDemoVideoHover function| mainDemoVideoDoHover function| mainInitLogo function| mainInitTgStickers function| setCookie function| getCookie function| mainScrollTo object| RLottie object| QueryableWorkerProxy function| QueryableWorker function| FrameQueue function| triggerEvent string| key1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.bqweasfxtc.cyou/ | Name: cf_clearance Value: lCDlKrawJN5ohF2_bkYZQTIktm3PARPxYNEE52BOSBc-1735131620-1.2.1.1-bjoYZfp_iOwKNWZtL1YigbXfQOPtooQVPaPLis4L5geQoVtcjWVTlsBHHGRBeHWKTm.V6VDLSWvUTKTkgdMxFJ1EhyUjH8L2Io_G008Amtd0jX3kKNLce12W0w_QNqpKuwQO_cakljMPv8W1SgyL2GTw7dvJc9_3bekU8EpewdS9QMkUsuMxaXioV0EjzstqBQVPurA1TtiWd.cMuswX4ta826ebTbwypRIN735nG2bzUmbiJqfZdW0_9uoVrrSbdSvd1h.ghe93o21vkrd7wvCJ345LICf3Ri0W8HBK0xVDcxykk7_NFPTd6sZODIv_vS2tlcXfceT1yIxN.4nsx9LViClkxGi5V6hjjTZO0flsDPdUeChb9M8ulg5Pcfw5 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
bqweasfxtc.cyou
bqweasfxtc.cyou
2606:4700:3035::ac43:b193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