URL: https://bypassed.ac/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8e855d4f2e862039
Submission: On November 28 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 2606:4700:20::ac43:46ef, located in United States and belongs to CLOUDFLARENET, US. The main domain is bypassed.ac.
TLS certificate: Issued by WE1 on November 20th 2024. Valid for: 3 months.
This is the only time bypassed.ac was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:20:... 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 bypassed.ac
bypassed.ac
44 KB
2 1
Domain Requested by
2 bypassed.ac
2 1

This site contains no links.

Subject Issuer Validity Valid
bypassed.ac
WE1
2024-11-20 -
2025-02-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://bypassed.ac/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8e855d4f2e862039
Frame ID: 6CAB48E91759A28A39E9DD45BAE150A8
Requests: 2 HTTP requests in this frame

Screenshot


Page Statistics

2
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

44 kB
Transfer

107 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request v1
bypassed.ac/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/
98 KB
37 KB
Document
General
Full URL
https://bypassed.ac/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8e855d4f2e862039
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:46ef , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
e3599e52ba2632b03938e8c6e6bafbf6388f481ef706fc98605814593a8dece8

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36

Response headers

cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
cf-ray
8e9a8e96ad4a371f-FRA
content-encoding
br
content-type
application/javascript; charset=UTF-8
date
Thu, 28 Nov 2024 13:03:15 GMT
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=XXm%2Bdp19P%2BFLsVh7IWdBkfLdp0zVOZladIqr09X094Q0WwFX1MrejaRGMzp0bE%2BnzJJuJyRqBPUQh9P3MT4ci9pYQ5biZZWkVEuNQgvmvw989kqMotWeHIeTGPJ1WTKXqTHWFXmVP1g5"}],"group":"cf-nel","max_age":604800}
server
cloudflare
server-timing
cfL4;desc="?proto=TCP&rtt=38863&min_rtt=38445&rtt_var=8525&sent=7&recv=10&lost=0&retrans=0&sent_bytes=4002&recv_bytes=2303&delivery_rate=101083&cwnd=252&unsent_bytes=0&cid=71f35bbfaa637cba&ts=65&x=0"
favicon.ico
bypassed.ac/
8 KB
7 KB
Other
General
Full URL
https://bypassed.ac/favicon.ico
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:20::ac43:46ef , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
389b38856b37d3a6d963c9ffe33f8fd2225e7b14c065b1e9021d907102fa9c68
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/131.0.0.0 Safari/537.36
Referer
https://bypassed.ac/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/v1?ray=8e855d4f2e862039

Response headers

content-encoding
br
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=bUg0eEDKmqlFARWjphmltNJWiPl23p5hmUqmtTIHfB8N36n7rk4eRXOWKTfXU4BqcFbnUW5cwkk9XgxjAqeiBMMixtNAugxouSyMMHOYUbXo6XFGc6%2BZVVdFrA5AoOMJs56Z53zurUNt"}],"group":"cf-nel","max_age":604800}
critical-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
expires
Thu, 01 Jan 1970 00:00:01 GMT
server-timing
cfL4;desc="?proto=TCP&rtt=44976&min_rtt=38438&rtt_var=12504&sent=49&recv=18&lost=0&retrans=0&sent_bytes=43076&recv_bytes=2542&delivery_rate=922939&cwnd=257&unsent_bytes=0&cid=71f35bbfaa637cba&ts=156&x=0"
x-content-options
nosniff
date
Thu, 28 Nov 2024 13:03:15 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
cf-mitigated
challenge
cf-chl-out
GX34jvK6jntvNTKJTya5anNTd4Pt9GFxQ3TZtHYXHlLiic5HW5JAZt8O0/03SjD5UBNLsp6wp4KKtJIoNAmi30GfaEkwDDu6dBz6r53pzI8vLa6mFSJ1GrM6Uyng5PEX1VuUvsNwJTMpGLvU5ayOUg==$dR8BkMdeBPPcGwERxSSP5Q==
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
cross-origin-opener-policy
same-origin
accept-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-resource-policy
same-origin
referrer-policy
same-origin
cf-ray
8e9a8e974dd3371f-FRA
cross-origin-embedder-policy
require-corp
permissions-policy
accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
origin-agent-cluster
?1
server
cloudflare

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://bypassed.ac/favicon.ico
Message:
Failed to load resource: the server responded with a status of 403 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bypassed.ac
2606:4700:20::ac43:46ef
389b38856b37d3a6d963c9ffe33f8fd2225e7b14c065b1e9021d907102fa9c68
e3599e52ba2632b03938e8c6e6bafbf6388f481ef706fc98605814593a8dece8