2m.wtf
Open in
urlscan Pro
2606:4700:3035::6815:2e99
Malicious Activity!
Public Scan
Effective URL: https://2m.wtf/PES/?id=2139614658
Submission: On January 29 via manual from EG — Scanned from DE
Summary
TLS certificate: Issued by E1 on January 19th 2022. Valid for: 3 months.
This is the only time 2m.wtf was scanned on urlscan.io!
urlscan.io Verdict: Potentially Malicious
Targeting these brands: Generic Gaming (Entertainment)Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 14 | 2606:4700:303... 2606:4700:3035::6815:2e99 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:811::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:827::2003 | 15169 (GOOGLE) (GOOGLE) | |
15 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
2m.wtf
2 redirects
2m.wtf |
695 KB |
2 |
gstatic.com
fonts.gstatic.com |
26 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 47 |
1 KB |
15 | 3 |
Domain | Requested by | |
---|---|---|
14 | 2m.wtf |
2 redirects
2m.wtf
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | fonts.googleapis.com |
2m.wtf
|
15 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.2m.wtf E1 |
2022-01-19 - 2022-04-19 |
3 months | crt.sh |
upload.video.google.com GTS CA 1C3 |
2021-12-27 - 2022-03-21 |
3 months | crt.sh |
*.gstatic.com GTS CA 1C3 |
2021-12-27 - 2022-03-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://2m.wtf/PES/?id=2139614658
Frame ID: B9D61FEB237E067BB83282526D7E8751
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
PES2021 COMPENSATION | Claim Your 5000 myclubCoinsPage URL History Show full URLs
-
https://2m.wtf/PES?id=2139614658
HTTP 301
http://2m.wtf/PES/?id=2139614658 HTTP 307
https://2m.wtf/PES/?id=2139614658 Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://2m.wtf/PES?id=2139614658
HTTP 301
http://2m.wtf/PES/?id=2139614658 HTTP 307
https://2m.wtf/PES/?id=2139614658 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 9- https://2m.wtf/PES/img/bg_wv.jpg HTTP 302
- https://2m.wtf/
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
2m.wtf/PES/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
AlAgxD7oxHZSiFZQmr6zl7N739c.js
2m.wtf/cdn-cgi/apps/head/ |
4 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
jquery.min.js
2m.wtf/PES/js/ |
94 KB 35 KB |
Script
application/x-javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
2m.wtf/PES/js/ |
153 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
invisible.js
2m.wtf/cdn-cgi/challenge-platform/h/b/scripts/ |
44 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
konami.png
2m.wtf/PES/img/ |
66 KB 66 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
coins.png
2m.wtf/PES/img/ |
198 KB 198 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
mv_index_2.png
2m.wtf/PES/img/ |
102 KB 103 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
6 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
back.jpg
2m.wtf/PES/img/ |
216 KB 216 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
2m.wtf/ Redirect Chain
|
23 KB 23 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v18/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
6xKydSBYKcSV-LCoeQqfX1RYOo3ik4zwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v18/ |
13 KB 13 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
pica.js
2m.wtf/cdn-cgi/challenge-platform/h/b/scripts/ |
23 KB 8 KB |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
result
2m.wtf/cdn-cgi/challenge-platform/h/b/cv/ |
2 B 703 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
Potentially malicious activity detected
Disclaimer: These verdicts should be used to detect potentially malicious websites, not as a final verdict!
urlscan
Phishing against: Generic Gaming (Entertainment)6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| CloudflareApps function| $ function| jQuery object| __CF$cv$params function| __cf_worker_run_after_load function| __cf_run_after_load1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.2m.wtf/ | Name: __cf_bm Value: nJz8zHcEN18NKg25E8wUQO5cTuwG3PP4Bta6L6eC7Jo-1643473944-0-AUodXw5DB/L5PATHKzlGMFSjbvNhAUX3GZCJDulndxL21/9kMcRAI66vCVduMtsGEA== |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=2592000; includeSubDomains; preload |
X-Content-Type-Options | nosniff |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
2m.wtf
fonts.googleapis.com
fonts.gstatic.com
2606:4700:3035::6815:2e99
2a00:1450:4001:811::200a
2a00:1450:4001:827::2003
0d14a3a656216743eb1e133b5af93d6eaa98c6260b411a01894323e62166f80f
1b1ea77b0d952615ca00cc397e9e134632d99424f2e3cf5ef2953962390040a5
252ae7c63e9acddaf01ae7d2133af8e3925e867152104c527326c47e22297787
253971fdb774858b020d5c21447c9cdfa36e1f258fad07463da70b5508a14f0b
2689367b205c16ce32ed4200942b8b8b1e262dfc70d9bc9fbc77c49699a4f1df
47d3c742f488c32b1092754c422ea2cea28db81900297d529f329847da4a79cf
6afaaacd908053a48ba88545a26be7c726da4d436ae38715f40f77728a33de8c
7209c26bc245ae1b293f4b9622201b1dc97282229a2e8fcae555f36caa8650e8
7b68ba60228f9b172eb4b23d0cedc17d66430cf304512ce83cec6ba1a463d7a8
8490874156eb6225f8708a36b29078bf94f35c31e90fbb5143c18c4335eb211f
9010f001830a1d9de5d25cff3ff24bafb9fb18da8d4a119198b1ee53c8f90329
aec3d419d50f05781a96f223e18289aeb52598b5db39be82a7b71dc67d6a7947
b1560cfffaff557e5349efd809c7614ec1278c0d98a9eab358366ca5f472b16a
ce60cd05599a7ef78d66b449b806d529d9011fcb7356c32bcb54f2a5f156be2d
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855