Submitted URL: http://cve.gay/
Effective URL: https://cve.gay/
Submission: On December 02 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 6 HTTP transactions. The main IP is 2602:fc2f:100:3200::a, located in United States and belongs to ATOMIC-NETWORKS-1, US. The main domain is cve.gay.
TLS certificate: Issued by R3 on September 19th 2023. Valid for: 3 months.
This is the only time cve.gay was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 7 2602:fc2f:100... 399820 (ATOMIC-NE...)
6 1
Apex Domain
Subdomains
Transfer
7 cve.gay
cve.gay
536 KB
6 1
Domain Requested by
7 cve.gay 1 redirects cve.gay
6 1

This site contains links to these domains. Also see Links.

Domain
wiki.cve.gay
git.cve.gay
ctftime.org
Subject Issuer Validity Valid
cve.gay
R3
2023-09-19 -
2023-12-18
3 months crt.sh

This page contains 1 frames:

Primary Page: https://cve.gay/
Frame ID: 697ABAA78EA999D60F9FE5067180A140
Requests: 6 HTTP requests in this frame

Screenshot

Page Title

sillysec

Page URL History Show full URLs

  1. http://cve.gay/ HTTP 302
    https://cve.gay/ Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • <link[^>]+?href="[^"]+bulma(?:\.min)?\.css

Page Statistics

6
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

536 kB
Transfer

4950 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://cve.gay/ HTTP 302
    https://cve.gay/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

6 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
cve.gay/
Redirect Chain
  • http://cve.gay/
  • https://cve.gay/
981 B
1 KB
Document
General
Full URL
https://cve.gay/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2602:fc2f:100:3200::a , United States, ASN399820 (ATOMIC-NETWORKS-1, US),
Reverse DNS
Software
nginx /
Resource Hash
d8afed225bc5cb193f4ad375796258f95da06434aa3e0f278920a15e9e67e073
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.199 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

accept-ranges
bytes
content-length
981
content-type
text/html; charset=utf-8
date
Sat, 02 Dec 2023 04:03:31 GMT
etag
"650a4713-3d5"
last-modified
Wed, 20 Sep 2023 01:12:51 GMT
server
nginx
x-content-type-options
nosniff
x-xss-protection
1; mode=block

Redirect headers

Connection
keep-alive
Content-Length
138
Content-Type
text/html
Date
Sat, 02 Dec 2023 04:03:29 GMT
Location
https://cve.gay/
Server
nginx
X-Clacks-Overhead
GNU Aaron Swartz
X-Powered-By
estrogen
bulma.css
cve.gay/
240 KB
240 KB
Stylesheet
General
Full URL
https://cve.gay/bulma.css
Requested by
Host: cve.gay
URL: https://cve.gay/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2602:fc2f:100:3200::a , United States, ASN399820 (ATOMIC-NETWORKS-1, US),
Reverse DNS
Software
nginx /
Resource Hash
4780d2ab5bfcb54e7d1c9ccbc74d5a6fb3ca893c095db7536fa3462f1668de3b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://cve.gay/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.199 Safari/537.36

Response headers

date
Sat, 02 Dec 2023 04:03:31 GMT
x-content-type-options
nosniff
last-modified
Tue, 25 Apr 2023 19:03:03 GMT
server
nginx
etag
"644823e7-3beee"
content-type
text/css
accept-ranges
bytes
content-length
245486
x-xss-protection
1; mode=block
style.css
cve.gay/
1 KB
2 KB
Stylesheet
General
Full URL
https://cve.gay/style.css
Requested by
Host: cve.gay
URL: https://cve.gay/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2602:fc2f:100:3200::a , United States, ASN399820 (ATOMIC-NETWORKS-1, US),
Reverse DNS
Software
nginx /
Resource Hash
7250e7e391da2d10a0a85624453491c1a3c5ee9e83ca7629c286fad939f7050b
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://cve.gay/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.199 Safari/537.36

Response headers

date
Sat, 02 Dec 2023 04:03:31 GMT
x-content-type-options
nosniff
last-modified
Sun, 10 Sep 2023 21:42:36 GMT
server
nginx
etag
"64fe384c-5ce"
content-type
text/css
accept-ranges
bytes
content-length
1486
x-xss-protection
1; mode=block
back.mp4
cve.gay/
4 MB
0
Media
General
Full URL
https://cve.gay/back.mp4
Requested by
Host: cve.gay
URL: https://cve.gay/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2602:fc2f:100:3200::a , United States, ASN399820 (ATOMIC-NETWORKS-1, US),
Reverse DNS
Software
nginx /
Resource Hash
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cve.gay/
Accept-Encoding
identity;q=1, *;q=0
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.199 Safari/537.36
Range
bytes=0-

Response headers

date
Sat, 02 Dec 2023 04:03:31 GMT
x-content-type-options
nosniff
last-modified
Tue, 25 Apr 2023 19:03:05 GMT
server
nginx
etag
"644823e9-6c10f8"
content-type
video/mp4
Content-Range
bytes 0-7082231/7082232
Content-Length
7082232
x-xss-protection
1; mode=block
GochiHand-Regular.ttf
cve.gay/
35 KB
35 KB
Font
General
Full URL
https://cve.gay/GochiHand-Regular.ttf
Requested by
Host: cve.gay
URL: https://cve.gay/style.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2602:fc2f:100:3200::a , United States, ASN399820 (ATOMIC-NETWORKS-1, US),
Reverse DNS
Software
nginx /
Resource Hash
57e17aabd8bfa36f9ce790f26a64176abd01f89df2fac8263aa50003daaf81b5
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cve.gay/style.css
Origin
https://cve.gay
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.199 Safari/537.36

Response headers

date
Sat, 02 Dec 2023 04:03:32 GMT
x-content-type-options
nosniff
last-modified
Sun, 10 Sep 2023 21:40:26 GMT
server
nginx
etag
"64fe37ca-8c6c"
content-type
application/octet-stream
accept-ranges
bytes
content-length
35948
x-xss-protection
1; mode=block
Raleway-VariableFont_wght.ttf
cve.gay/
257 KB
257 KB
Font
General
Full URL
https://cve.gay/Raleway-VariableFont_wght.ttf
Requested by
Host: cve.gay
URL: https://cve.gay/style.css
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2602:fc2f:100:3200::a , United States, ASN399820 (ATOMIC-NETWORKS-1, US),
Reverse DNS
Software
nginx /
Resource Hash
3548e08b4ab3c9c1f4c896ae70f5707486deb31f9b6f9cc5cf6fd5d8dccb8676
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block

Request headers

Referer
https://cve.gay/style.css
Origin
https://cve.gay
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/119.0.6045.199 Safari/537.36

Response headers

date
Sat, 02 Dec 2023 04:03:32 GMT
x-content-type-options
nosniff
last-modified
Tue, 25 Apr 2023 19:03:03 GMT
server
nginx
etag
"644823e7-403c0"
content-type
application/octet-stream
accept-ranges
bytes
content-length
263104
x-xss-protection
1; mode=block

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Xss-Protection 1; mode=block