grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
Open in
urlscan Pro
20.187.113.148
Malicious Activity!
Public Scan
Submission: On June 15 via automatic, source openphish — Scanned from DE
Summary
This is the only time grub-whatsaap-pemersatu-bangsa-181818.duckdns.org was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 20.187.113.148 20.187.113.148 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
2 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:80e::2001 | 15169 (GOOGLE) (GOOGLE) | |
2 | 2620:0:862:ed... 2620:0:862:ed1a::2:b | 14907 (WIKIMEDIA) (WIKIMEDIA) | |
1 | 23.48.23.59 23.48.23.59 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
3 | 92.123.225.40 92.123.225.40 | 20940 (AKAMAI-ASN1) (AKAMAI-ASN1) | |
1 | 135.181.63.70 135.181.63.70 | 24940 (HETZNER-AS) (HETZNER-AS) | |
1 | 202.73.99.59 202.73.99.59 | 23700 (FASTNET-A...) (FASTNET-AS-ID Linknet-Fastnet ASN) | |
1 | 107.161.50.42 107.161.50.42 | 395092 (SHOCK-1) (SHOCK-1) | |
1 | 104.90.137.209 104.90.137.209 | 16625 (AKAMAI-AS) (AKAMAI-AS) | |
1 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:1a | 20446 (STACKPATH...) (STACKPATH-CDN) | |
1 | 129.226.2.89 129.226.2.89 | 132203 (TENCENT-N...) (TENCENT-NET-AP-CN Tencent Building) | |
17 | 12 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a23-48-23-59.deploy.static.akamaitechnologies.com
cdngarenanow-a.akamaihd.net |
ASN20940 (AKAMAI-ASN1, NL)
PTR: a92-123-225-40.deploy.static.akamaitechnologies.com
freefiremobile-a.akamaihd.net |
ASN23700 (FASTNET-AS-ID Linknet-Fastnet ASN, ID)
PTR: fm-dyn-202-73-99-59.fast.net.id
staging.firstmedia.com |
ASN16625 (AKAMAI-AS, US)
PTR: a104-90-137-209.deploy.static.akamaitechnologies.com
img.utdstc.com |
ASN132203 (TENCENT-NET-AP-CN Tencent Building, Kejizhongyi Avenue, CN)
na.apps.amsoveasea.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
4 |
akamaihd.net
cdngarenanow-a.akamaihd.net — Cisco Umbrella Rank: 5991 freefiremobile-a.akamaihd.net — Cisco Umbrella Rank: 23527 |
50 KB |
2 |
wikimedia.org
upload.wikimedia.org — Cisco Umbrella Rank: 2733 |
55 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 246 |
83 KB |
2 |
duckdns.org
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org |
6 KB |
1 |
amsoveasea.com
na.apps.amsoveasea.com — Cisco Umbrella Rank: 135116 |
181 B |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 686 |
30 KB |
1 |
utdstc.com
img.utdstc.com — Cisco Umbrella Rank: 101841 |
14 KB |
1 |
im.ge
i.im.ge — Cisco Umbrella Rank: 588531 |
28 KB |
1 |
firstmedia.com
staging.firstmedia.com |
224 KB |
1 |
top4top.io
j.top4top.io — Cisco Umbrella Rank: 641709 |
35 KB |
1 |
blogspot.com
1.bp.blogspot.com — Cisco Umbrella Rank: 9517 |
62 KB |
17 | 11 |
Domain | Requested by | |
---|---|---|
3 | freefiremobile-a.akamaihd.net |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
2 | upload.wikimedia.org |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
2 | cdnjs.cloudflare.com |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
cdnjs.cloudflare.com |
2 | grub-whatsaap-pemersatu-bangsa-181818.duckdns.org |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | na.apps.amsoveasea.com |
code.jquery.com
|
1 | code.jquery.com |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | img.utdstc.com |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | i.im.ge |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | staging.firstmedia.com |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | j.top4top.io |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | cdngarenanow-a.akamaihd.net |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
1 | 1.bp.blogspot.com |
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
|
17 | 12 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sni.cloudflaressl.com Cloudflare Inc ECC CA-3 |
2021-09-21 - 2022-09-20 |
a year | crt.sh |
misc-sni.blogspot.com GTS CA 1C3 |
2022-05-25 - 2022-08-17 |
3 months | crt.sh |
*.wikipedia.org DigiCert TLS Hybrid ECC SHA384 2020 CA1 |
2021-10-19 - 2022-11-17 |
a year | crt.sh |
a248.e.akamai.net DigiCert SHA2 Secure Server CA |
2021-07-15 - 2022-07-20 |
a year | crt.sh |
top4top.io R3 |
2022-04-14 - 2022-07-13 |
3 months | crt.sh |
*.firstmedia.com Sectigo RSA Domain Validation Secure Server CA |
2021-09-13 - 2022-10-14 |
a year | crt.sh |
i.im.ge Sectigo RSA Domain Validation Secure Server CA |
2021-09-25 - 2022-09-25 |
a year | crt.sh |
uptodown.com DigiCert SHA2 Secure Server CA |
2021-09-14 - 2022-09-14 |
a year | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
na.apps.amsoveasea.com TrustAsia RSA DV TLS CA G2 |
2022-05-17 - 2023-05-17 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://grub-whatsaap-pemersatu-bangsa-181818.duckdns.org/
Frame ID: 12594DA579D56872EEACDAF554409CB1
Requests: 17 HTTP requests in this frame
Screenshot
Page Title
Garena Free Fire. Best survival Battle Royale on mobile!Detected technologies
Font Awesome (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org/ |
26 KB 6 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org/css/ |
0 0 |
Stylesheet
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
font-awesome.css
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/css/ |
37 KB 6 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
lambang%2Bgarena%2Bfree%2Bfire.png
1.bp.blogspot.com/-MejqdCK-qAs/YCf6VJFxsWI/AAAAAAAAHGk/0DocEO1RFdYOm1PJUqZ41Lq2sjugfXfywCNcBGAsYHQ/s382/ |
62 KB 62 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2048px-OOjs_UI_icon_language-ltr.svg.png
upload.wikimedia.org/wikipedia/commons/thumb/4/43/OOjs_UI_icon_language-ltr.svg/ |
53 KB 54 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Flag_of_Indonesia.svg
upload.wikimedia.org/wikipedia/commons/9/9f/ |
148 B 1 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
diamond.png
cdngarenanow-a.akamaihd.net/gstaticid/FF_ID/wishscarletgroom/ |
1 KB 1 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoslogan2_20210113.png
freefiremobile-a.akamaihd.net/common/web_event/official/ |
29 KB 29 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
appstore2.png
freefiremobile-a.akamaihd.net/ffwebsite/images/download/ |
11 KB 12 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
googlePlay2.png
freefiremobile-a.akamaihd.net/ffwebsite/images/download/ |
8 KB 9 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
p_21888qrpk0.jpg
j.top4top.io/ |
35 KB 35 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bt-success-fm.gif
staging.firstmedia.com/assets/images/ |
224 KB 224 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Tw3QNy.png
i.im.ge/2021/09/15/ |
28 KB 28 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
e61511ae88f7d52fac67cd4c4f9c739bf71572d2923e1acf512f249ae0544fd4:200
img.utdstc.com/icon/e61/511/ |
14 KB 14 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
fontawesome-webfont.woff2
cdnjs.cloudflare.com/ajax/libs/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
/
na.apps.amsoveasea.com/swoole/ |
39 B 181 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)12 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch object| navigation function| $ function| jQuery function| serialize function| animateValue function| listen function| extend0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
1.bp.blogspot.com
cdngarenanow-a.akamaihd.net
cdnjs.cloudflare.com
code.jquery.com
freefiremobile-a.akamaihd.net
grub-whatsaap-pemersatu-bangsa-181818.duckdns.org
i.im.ge
img.utdstc.com
j.top4top.io
na.apps.amsoveasea.com
staging.firstmedia.com
upload.wikimedia.org
104.90.137.209
107.161.50.42
129.226.2.89
135.181.63.70
20.187.113.148
2001:4de0:ac18::1:a:1a
202.73.99.59
23.48.23.59
2606:4700::6811:180e
2620:0:862:ed1a::2:b
2a00:1450:4001:80e::2001
92.123.225.40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