dguow.info
Open in
urlscan Pro
2606:4700:3034::6815:5a4c
Public Scan
Effective URL: https://dguow.info/opt/out
Submission Tags: 0xscam
Submission: On November 25 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on November 25th 2024. Valid for: 3 months.
This is the only time dguow.info was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 2 | 2606:4700:303... 2606:4700:3034::6815:5a4c | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
1 6 | 172.67.153.205 172.67.153.205 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
7 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
dguow.info
2 redirects
dguow.info |
190 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 |
1 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
8 | dguow.info |
2 redirects
dguow.info
|
1 | fonts.googleapis.com |
dguow.info
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
dguow.info WE1 |
2024-11-25 - 2025-02-23 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://dguow.info/opt/out
Frame ID: 1868703EFBAB780FAE0DE880AF9340B7
Requests: 6 HTTP requests in this frame
Frame:
https://dguow.info/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js
Frame ID: 15BB54C29F7C178379F623B7DB797908
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://dguow.info/
HTTP 302
http://dguow.info/opt/out HTTP 307
https://dguow.info/opt/out Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://dguow.info/
HTTP 302
http://dguow.info/opt/out HTTP 307
https://dguow.info/opt/out Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://dguow.info/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://dguow.info/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/main.js
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
out
dguow.info/opt/ Redirect Chain
|
8 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.css
dguow.info/build/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.js
dguow.info/build/ |
384 KB 103 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
dguow.info/cdn-cgi/challenge-platform/h/g/scripts/jsd/e4025c85ea63/ Frame 15BB Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flags.007b2705.png
dguow.info/build/images/ |
69 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8e83d2a1fff130e4
dguow.info/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame 15BB |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| intlTelInputGlobals object| intlTelInputUtils object| iti2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
dguow.info/ | Name: PHPSESSID Value: vkcld6703ji9ieq9k5msit5lml |
|
.dguow.info/ | Name: cf_clearance Value: G.6bVI._BT.4xGTXW5Hgce6hwWSeNpOUa1uTFIfRhCU-1732560610-1.2.1.1-xeJlH1VxbrUk26ZrGhEE20WzF4cn7i.qpaeDm6_IGOzmgDr_uIDVJcFi_TziKd7zkyNGiJc2gD32X1PE1l7OfosmMUAGiE.RGDxeSF6C2LpMp1XyNz8P4XBCn5zMZQOEU92NVUGK5azjM6yJ33XqHrzsXhEUurzcQOFbvOIY1mBLEEZl4wVfKKdNF7bE4Dr_1lMIIpn00BL9AgDOXrbJKYZy.eGOhqGMC73IkI2mpvm55oaHIUcnEPfgeeXdJvi1BiQDXI6FAM_VOLC4w8u4tiLdJfElMv.btGMzFPTCW2NZMDkk1yDBIM4u5fZiC8bW2z7l8UpGP9UpHI42PZpWFFh9lbYv3As3zKdSrzS8Iwky.1U1pk4uRwTvE85d48Eq |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
dguow.info
fonts.googleapis.com
172.67.153.205
2606:4700:3034::6815:5a4c
2a00:1450:4001:800::200a
0347ab2620ebb1543d26973da4751eef397df76ae44b16b43b1dec892aa685cd
0a012cf808a24573168308916092d2d4bd3f2b4af8e16b59167013cc77acee55
1be05c0e0b660654d46291ab12d51f81ece71f81677c5e2020efcbe501e1cb3b
623388f11311de0fd5347d31bd906b6891e23a49d096202a44ffbe4379b94eee
72b78573841119b6e3fe3f7ee0845e126fb525a6d7f05c7268306a458a726fdc
74afb429cfe38917edb4c50e4ec14f54b66003e43eee851ab6183f288fe2a927
c29e9fa4775e336b38c5c64cdd3d4d36e85fb8b9113eeadb0cd5f2b0478ad829
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855