exevaf.online
Open in
urlscan Pro
2606:4700:3031::ac43:d2f3
Public Scan
Effective URL: https://exevaf.online/opt/out
Submission: On November 12 via api from BE — Scanned from US
Summary
TLS certificate: Issued by WE1 on November 8th 2024. Valid for: 3 months.
This is the only time exevaf.online was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 2606:4700:303... 2606:4700:3031::ac43:d2f3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2607:f8b0:400... 2607:f8b0:4006:81e::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
exevaf.online
2 redirects
exevaf.online |
189 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 |
1 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
8 | exevaf.online |
2 redirects
exevaf.online
|
1 | fonts.googleapis.com |
exevaf.online
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
exevaf.online WE1 |
2024-11-08 - 2025-02-06 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://exevaf.online/opt/out
Frame ID: DC8F6FEA3C88F92B7A6E5321D961040F
Requests: 6 HTTP requests in this frame
Frame:
https://exevaf.online/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/main.js
Frame ID: F985BDEDED67256B7ACF06C5D029CBCD
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://exevaf.online/
HTTP 302
http://exevaf.online/opt/out HTTP 307
https://exevaf.online/opt/out Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://exevaf.online/
HTTP 302
http://exevaf.online/opt/out HTTP 307
https://exevaf.online/opt/out Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://exevaf.online/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://exevaf.online/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/main.js
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
out
exevaf.online/opt/ Redirect Chain
|
7 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.css
exevaf.online/build/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.js
exevaf.online/build/ |
384 KB 103 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
exevaf.online/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/ Frame F985 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flags.007b2705.png
exevaf.online/build/images/ |
69 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8e13f772eb62433a
exevaf.online/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame F985 |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| intlTelInputGlobals object| intlTelInputUtils object| iti2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
exevaf.online/ | Name: PHPSESSID Value: 63k12gf649ujcvl1mltmno3jt8 |
|
.exevaf.online/ | Name: cf_clearance Value: wBBxAI.WPW35WYaL6M1QoRpsEb0ahIU4RyeVwPWHEgk-1731387714-1.2.1.1-u1BzohX3ACEOx6N2TVuj.4uDFI6HyfaHv_Ar0gGWOtNnEvS2.2iUpjErRIxQNQC5YoYSIxug6VlJaWAadE84GAbNfFUh6yrrvnV6JZfDvw_wCmU563psCuWddHw8VI6gsAoTydm9YHG1dtFIgVvQAqikClXonobUGQgYe4r0uoUaX4ETR9XdtjyEXlMP2FJoKtrqauR2aFMjghp.U7iCmeY22xiBkk.CjFAV2odjZyXwtxvlVcOqGFPGOq97DrpWA35vQZp4s75EVk.eczqiKIFyyYSLkRo4z4_NWETHbgeQ3vYaJvgSlfI1ciuLye2w1fBgaCZXXlsESBHgLk1BXJKf.x9uPt8pFWj3g_tBZBPI9MuYOhU8SnM7pi7aPAAg |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
exevaf.online
fonts.googleapis.com
2606:4700:3031::ac43:d2f3
2607:f8b0:4006:81e::200a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