| pubgsteam.com/_nuxt/7240319.js | 207.148.113.242 | 200 OK | 1.2 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/7240319.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, ASCII text, with very long lines (2485), with no line terminators Hasheff7ca496d809e9a457d57a5be5115d9 685de9f882fee6470a03e8ff2b59bfbcacbf532a ad7b2c3578a79c93260e11afbb58039c5ac3182301e53c0b8606583ff6de4295
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/7240319.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:46 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"9b5-18f3adeaaec"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| | 207.148.113.242 | 200 OK | 101 kB |
URL User Request GET HTTP/1.1IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeHTML document, Unicode text, UTF-8 text, with very long lines (64260) Size101 kB (101140 bytes) Hash7b98de445bdc8aa3819ced3aa82e4f4d 0e6abd13acd284f76dd85279f3c38d6f9355a320 40ba8e260395fbd645466b7d4be81d86bc11caa3e79d6e8f792835f183e0f5d8
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET / HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:45 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:44 GMT
ETag: W/"bb540-18f3adeb364"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 | 95.101.11.43 | 200 OK | 3.7 kB |
URL GET HTTP/1.1community.akamai.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1 IP95.101.11.43:443 ASN#20940 Akamai International B.V.
CertificateIssuerLet's Encrypt Subjectcdn.akamai.steamstatic.com FingerprintE0:5D:52:B1:76:EB:D8:4A:30:6F:25:76:22:B1:31:81:41:54:C4:74 ValidityThu, 04 Apr 2024 17:02:56 GMT - Wed, 03 Jul 2024 17:02:55 GMT
File typePNG image data, 96 x 26, 8-bit/color RGBA, non-interlaced Hash1626f52addb7c56fe3679d82108c62e9 2b414092d66ecff528950093a655f755c3c7f3b5 ae9f6c61e25d15882bf57bde193d10d375bd315c9741cabda11d700fd1bb7dd1
GET /public/images/skin_1/footerLogo_valve.png?v=1 HTTP/1.1
Host: community.akamai.steamstatic.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Content-Type: image/png
Content-Length: 3737
Last-Modified: Fri, 05 Jan 2018 01:34:51 GMT
ETag: "5a4ed63b-e99"
Accept-Ranges: bytes
Date: Thu, 09 May 2024 19:51:47 GMT
Connection: keep-alive
|
|
| community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 | 95.101.11.43 | 200 OK | 1.7 kB |
URL GET HTTP/1.1community.akamai.steamstatic.com/public/shared/images/header/logo_steam.svg?t=962016 IP95.101.11.43:443 ASN#20940 Akamai International B.V.
CertificateIssuerLet's Encrypt Subjectcdn.akamai.steamstatic.com FingerprintE0:5D:52:B1:76:EB:D8:4A:30:6F:25:76:22:B1:31:81:41:54:C4:74 ValidityThu, 04 Apr 2024 17:02:56 GMT - Wed, 03 Jul 2024 17:02:55 GMT
File typeSVG Scalable Vector Graphics image Hashb7a7e43284e2ffe806ac1bc27c1f6a87 e8196489e2ae99ec6eb33995b5a3e108d6e44de0 c3a7c646a1305017f22423030cb5a12acc9f96b64013dcef7aeb80567b542cbb
GET /public/shared/images/header/logo_steam.svg?t=962016 HTTP/1.1
Host: community.akamai.steamstatic.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx
Content-Type: image/svg+xml
Last-Modified: Tue, 17 Nov 2020 23:34:54 GMT
ETag: "5fb45e1e-e64"
Access-Control-Allow-Origin: *
Accept-Ranges: bytes
Vary: Accept-Encoding
Content-Encoding: gzip
Content-Length: 1736
Date: Thu, 09 May 2024 19:51:47 GMT
Connection: keep-alive
|
|
| pubgsteam.com/_nuxt/static/1714679622/state.js | 207.148.113.242 | 200 OK | 253 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/state.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, ASCII text, with very long lines (332), with no line terminators Hashda525d8265261bda64f074392f32bfbf abc8b262ffa7abe691e0111550c0a31fe5ad534a 0cb06ab805fe4b94bc6ea12f527876904af419810a3ec8739266ff784c8f8c76
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/state.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"14c-18f3adeabc0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/ffa43b1.js | 207.148.113.242 | 200 OK | 1.3 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/ffa43b1.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, Unicode text, UTF-8 text, with very long lines (2097), with no line terminators Hash4ee1976ee51a6de739c600c70c1b8a08 0bd4bb83d1d891e3458e843b7defdf3a82d52301 e473b60a132a8f6a2e1192077d0bb7898692eac671bdc3050522596f2a0bd25c
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/ffa43b1.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"95f-18f3adeaaec"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/f314d7d.js | 207.148.113.242 | 200 OK | 11 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/f314d7d.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, Unicode text, UTF-8 text, with very long lines (43399), with no line terminators Hash68bd4618b178ee53ac863bf2a2f1271e 27e658a0db07888649f35e87d92d0605d540a027 1021ce183511163ddc77ffde653a0867d4a11cf224d27688e8481c4fbd23c1a5
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/f314d7d.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"ab51-18f3adeaaec"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/payload.js | 207.148.113.242 | 200 OK | 75 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/payload.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hashb49c5dd75ec38c6860b0940260c68bf4 e796778b1d77e5e6d44a98432c8eec3dbb7e1767 2ccad135b820dd22a56f4cdd2f420fe12b5a2256b4dcd3892a79ec75e115c5f5
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/payload.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"37-18f3adeabc0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/manifest.js | 207.148.113.242 | 200 OK | 110 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/manifest.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hash798018c41e8f6b917e0bf79c4e47645c ba4687463a2902b3ff5577245b3b439ada7c4ea5 7e938d94a8df4b1ff2829d9130e3d49d4e469eb14efc86f3982f5e29dbf04ab3
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/manifest.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:44 GMT
ETag: W/"71-18f3adeb3cc"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/images/btn_header_installsteam_download.png | 207.148.113.242 | 200 OK | 291 B |
URL GET HTTP/1.1pubgsteam.com/images/btn_header_installsteam_download.png IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typePNG image data, 15 x 13, 8-bit/color RGBA, non-interlaced Hasha2796187c58c7e948159e37d6990ecc2 4209cd85add507247f9ce5a87a8c9095b54ee417 23341256db7f44b1f3811880fa2bae6b7748bbf6b62c544a162e38cf0d5c5082
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /images/btn_header_installsteam_download.png HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: image/png
Content-Length: 291
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"123-18f3adeaae8"
|
|
| pubgsteam.com/_nuxt/1884090.js | 207.148.113.242 | 200 OK | 91 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/1884090.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, ASCII text, with very long lines (65485) Hashf0ecf6749df8ee84e42b2f22e732f31e 4e850eb3b1c2edf6e0f01ca7ed9b974a07b52c7f ed59c964cdd9ec33e73a7daa376cbefbf00e1f4b1a23e7f174fbd24d8b357ce7
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/1884090.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:46 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"413b5-18f3adeaaf0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/images/header_menu_hamburger.png | 207.148.113.242 | 200 OK | 3.8 kB |
URL GET HTTP/1.1pubgsteam.com/images/header_menu_hamburger.png IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typePNG image data, 244 x 212, 8-bit/color RGBA, non-interlaced Hasheabc76eb57feae44add7faead028521e 4e3e53938fad15661d2d046a868338841a95db19 fc9e6260a2706ae146282d77e67bc1b74688435f8912ab4c1932641eec28bffa
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /images/header_menu_hamburger.png HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: image/png
Content-Length: 3777
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"ec1-18f3adeaae8"
|
|
| pubgsteam.com/images/header_logo.png | 207.148.113.242 | 200 OK | 11 kB |
URL GET HTTP/1.1pubgsteam.com/images/header_logo.png IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typePNG image data, 744 x 171, 8-bit/color RGBA, non-interlaced Hasha4e79c73ee13cb25b60fc4b0ba1f690c b690c31b2eb1b0eb085e91aaae7e79f03debe7c1 6cb869df089146c12efb5e9c968e911c314842624ba6f052a11346ac734cadc8
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /images/header_logo.png HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: image/png
Content-Length: 10863
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"2a6f-18f3adeaae8"
|
|
| pubgsteam.com/images/new_login_bg_strong_mask.jpg | 207.148.113.242 | 200 OK | 124 kB |
URL GET HTTP/1.1pubgsteam.com/images/new_login_bg_strong_mask.jpg IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJPEG image data, Exif standard: [TIFF image data, little-endian, direntries=0], baseline, precision 8, 1920x1080, components 3 Size124 kB (124529 bytes) Hash48b805d8fa321668db4ce8dfd96db5b9 e0ded2606559c8100ef544c1f1c704e878a29b92 9a75f8cc40bbe9c9499e7b2d3bab98a447685a361489357a111479517005c954
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /images/new_login_bg_strong_mask.jpg HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: image/jpeg
Content-Length: 124529
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"1e671-18f3adeaae8"
|
|
| pubgsteam.com/_nuxt/b4fe92e.js | 207.148.113.242 | 200 OK | 784 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/b4fe92e.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, ASCII text, with very long lines (65485) Size784 kB (783574 bytes) Hash0e647359a24a97e5616116a41a42ba5c 6664cc06d8d331c9ebc1b842b6eb243af97b4d12 e49c178ff3e2819c7f1f75e234ddda0b57650698349e086a40acd1d7d1874e7e
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/b4fe92e.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:47 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"316d48-18f3adeaaec"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/manifest.js | 207.148.113.242 | 200 OK | 110 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/manifest.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hash798018c41e8f6b917e0bf79c4e47645c ba4687463a2902b3ff5577245b3b439ada7c4ea5 7e938d94a8df4b1ff2829d9130e3d49d4e469eb14efc86f3982f5e29dbf04ab3
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/manifest.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:49 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:44 GMT
ETag: W/"71-18f3adeb3cc"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/favicon.png | 207.148.113.242 | 404 Not Found | 140 B |
URL GET HTTP/1.1pubgsteam.com/favicon.png IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeHTML document, ASCII text Hashfa4b6e9aab03d8282b894133270a718b 0ed6615357d58d701ba596979ba172bfd944d91c 15787f7c6368f93fb349aec122182cd8779652207c84faddf77e83f39ef3f78d
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /favicon.png HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 404 Not Found
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:49 GMT
Content-Type: text/html; charset=utf-8
Transfer-Encoding: chunked
Connection: keep-alive
Content-Security-Policy: default-src 'none'
X-Content-Type-Options: nosniff
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/payload.js | 207.148.113.242 | 200 OK | 75 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/payload.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hashb49c5dd75ec38c6860b0940260c68bf4 e796778b1d77e5e6d44a98432c8eec3dbb7e1767 2ccad135b820dd22a56f4cdd2f420fe12b5a2256b4dcd3892a79ec75e115c5f5
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/payload.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"37-18f3adeabc0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/qua-tang-steam/payload.js | 207.148.113.242 | 200 OK | 89 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/qua-tang-steam/payload.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hashb579fba1ad03dabe52ea2cc2a61f41b1 af3233430ec8012391512700f8a5e46e6fbb6dca be15b921d18294a417b2b0433390fc43457de7a5b8d1d9f53184bd66a179c4f2
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/qua-tang-steam/payload.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"45-18f3adeabc0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/e49893c.js | 207.148.113.242 | 200 OK | 1.5 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/e49893c.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, Unicode text, UTF-8 text, with very long lines (2922), with no line terminators Hash8d19c3e086704090bb68162cb8d0ebf4 c444276664c277a3fb8e69d892751ce9ebd68f32 c025bc8fb399a704b71bfaade0e023d6839efc0f4fa1e124f9a77a74efab63ba
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/e49893c.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"d44-18f3adeaaec"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/10b3395.js | 207.148.113.242 | 200 OK | 1.9 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/10b3395.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, Unicode text, UTF-8 text, with very long lines (3606), with no line terminators Hash2286e430dbac68f54979adf380682fa0 135911ea4d845f49f17f801a8d871727f5bc7ccd 4c41bf922f08a710d0af59653b73a2c7c720c22983232b825bb0ebbd1453861c
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/10b3395.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"1049-18f3adeaaf0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/a2e5f21.js | 207.148.113.242 | 200 OK | 1.5 kB |
URL GET HTTP/1.1pubgsteam.com/_nuxt/a2e5f21.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeJavaScript source, Unicode text, UTF-8 text, with very long lines (2772), with no line terminators Hash9452de32a2f838fa408577113ae87c84 a9585695845e04d091ae977429f1ba5f3a085d9f bd640d5fbc90dd4e1ce4f6161bb30e51e459127a8061b69f0f4cb746b7f4768d
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/a2e5f21.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"c50-18f3adeaaec"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/tro-choi/payload.js | 207.148.113.242 | 200 OK | 83 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/tro-choi/payload.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hashf95140ef2d940a48f5cc18577feb7965 b4f249110ef719eb12d734ff54cb54c101350131 caf2ea81a83420ca72e96cebe06ebf5b8b97fb24b32b58b56afb780613f0fefd
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/tro-choi/payload.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"3f-18f3adeabc0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|
| pubgsteam.com/_nuxt/static/1714679622/steam-giftcode/payload.js | 207.148.113.242 | 200 OK | 89 B |
URL GET HTTP/1.1pubgsteam.com/_nuxt/static/1714679622/steam-giftcode/payload.js IP207.148.113.242:443
CertificateIssuerLet's Encrypt Subjectpubgsteam.com Fingerprint2F:20:AC:FE:E1:81:25:6B:C0:2E:B4:E5:30:47:74:9B:20:16:3E:AA ValidityMon, 22 Apr 2024 18:48:53 GMT - Sun, 21 Jul 2024 18:48:52 GMT
File typeASCII text, with no line terminators Hash80332b09038a63d99785336e42fb9180 5dd26c4e492b3d1b606e7ba04f6f118425a2ae35 6f243352ba22fe8c2e43408d425e6473c70ae7b77e7c0ed6d4a389dd3d280603
Analyzer | Verdict | Alert | OpenPhish | phishing | Steam | PhishTank | phishing | Other | Quad9 DNS | malicious | Sinkholed |
GET /_nuxt/static/1714679622/steam-giftcode/payload.js HTTP/1.1
Host: pubgsteam.com
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: */*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Connection: keep-alive
Referer: https://pubgsteam.com/
Sec-Fetch-Dest: script
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 200 OK
Server: nginx/1.18.0 (Ubuntu)
Date: Thu, 09 May 2024 19:51:50 GMT
Content-Type: application/javascript; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Accept-Ranges: bytes
Cache-Control: public, max-age=0
Last-Modified: Thu, 02 May 2024 19:53:42 GMT
ETag: W/"45-18f3adeabc0"
Vary: Accept-Encoding
Content-Encoding: gzip
|
|