bruteforcegroup.cloudflareaccess.com Open in urlscan Pro
104.19.194.29  Public Scan

Submitted URL: http://bozza.au/
Effective URL: https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b...
Submission: On October 30 via manual from AU — Scanned from AU

Summary

This website contacted 1 IPs in 1 countries across 2 domains to perform 1 HTTP transactions. The main IP is 104.19.194.29, located in and belongs to CLOUDFLARENET, US. The main domain is bruteforcegroup.cloudflareaccess.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on August 9th 2023. Valid for: 6 months.
This is the only time bruteforcegroup.cloudflareaccess.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2 104.21.55.159 13335 (CLOUDFLAR...)
1 104.19.194.29 13335 (CLOUDFLAR...)
1 1
Apex Domain
Subdomains
Transfer
2 bozza.au
bozza.au
2 KB
1 cloudflareaccess.com
bruteforcegroup.cloudflareaccess.com
19 KB
1 2
Domain Requested by
2 bozza.au 2 redirects
1 bruteforcegroup.cloudflareaccess.com
1 2

This site contains links to these domains. Also see Links.

Domain
www.cloudflarestatus.com
Subject Issuer Validity Valid
ssl1075497.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2023-08-09 -
2024-02-15
6 months crt.sh

This page contains 1 frames:

Primary Page: https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b3a&redirect_url=%2F&meta=eyJraWQiOiIwOWZlZjA5NGNkMmU5YmMyMWMzZjc5MGQ3YzA3Mzg1ZmY2Yzc1NGE1ODNjNWIxNGQyMDUxYzUxNzg2N2JkYjk5IiwiYWxnIjoiUlMyNTYiLCJ0eXAiOiJKV1QifQ.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.cSLnpB2s6Va8XEutVijaVD7b6Y3NYxR5jauQcVcNlIJV1rsQC_KmXrr5GPu3opb5ic7rJMoWzUEAjunwb5hCesmfka_xS94-6ZK0trHL4Tt9kS8h_T8B_TOut9qTOsXwwndBa5Obh67c9G3_UTwZrrjksMErkGQ9G1XC8zouMUXL7MwdgCsHaoeNB8xfV8JVecRuko99cPW5EP2dADBu78lyQW27z5p4PbZ4QKzV8CUtxbI1UrtNWfpx_ESWX-GXY2COmvgfspM_JF1ZwvcEc7kzzTPMepxMCKrsWSsCAXiIGukeqPHST7kgYsOlb1Pk4Du2MP4UiZ0hn3DIcYmGGA
Frame ID: 39D56460AFB38A14ADF54D772E8E0712
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Error ・ Cloudflare Access

Page URL History Show full URLs

  1. http://bozza.au/ HTTP 301
    https://bozza.au/ HTTP 302
    https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda... Page URL

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

2
Domains

2
Subdomains

1
IPs

1
Countries

19 kB
Transfer

19 kB
Size

1
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://bozza.au/ HTTP 301
    https://bozza.au/ HTTP 302
    https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b3a&redirect_url=%2F&meta=eyJraWQiOiIwOWZlZjA5NGNkMmU5YmMyMWMzZjc5MGQ3YzA3Mzg1ZmY2Yzc1NGE1ODNjNWIxNGQyMDUxYzUxNzg2N2JkYjk5IiwiYWxnIjoiUlMyNTYiLCJ0eXAiOiJKV1QifQ.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.cSLnpB2s6Va8XEutVijaVD7b6Y3NYxR5jauQcVcNlIJV1rsQC_KmXrr5GPu3opb5ic7rJMoWzUEAjunwb5hCesmfka_xS94-6ZK0trHL4Tt9kS8h_T8B_TOut9qTOsXwwndBa5Obh67c9G3_UTwZrrjksMErkGQ9G1XC8zouMUXL7MwdgCsHaoeNB8xfV8JVecRuko99cPW5EP2dADBu78lyQW27z5p4PbZ4QKzV8CUtxbI1UrtNWfpx_ESWX-GXY2COmvgfspM_JF1ZwvcEc7kzzTPMepxMCKrsWSsCAXiIGukeqPHST7kgYsOlb1Pk4Du2MP4UiZ0hn3DIcYmGGA Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request bozza.au
bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/
Redirect Chain
  • http://bozza.au/
  • https://bozza.au/
  • https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b3a&redirect_url=%2F&meta=eyJraWQiOiIwOWZlZjA5NGNkMmU5YmM...
19 KB
19 KB
Document
General
Full URL
https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b3a&redirect_url=%2F&meta=eyJraWQiOiIwOWZlZjA5NGNkMmU5YmMyMWMzZjc5MGQ3YzA3Mzg1ZmY2Yzc1NGE1ODNjNWIxNGQyMDUxYzUxNzg2N2JkYjk5IiwiYWxnIjoiUlMyNTYiLCJ0eXAiOiJKV1QifQ.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.cSLnpB2s6Va8XEutVijaVD7b6Y3NYxR5jauQcVcNlIJV1rsQC_KmXrr5GPu3opb5ic7rJMoWzUEAjunwb5hCesmfka_xS94-6ZK0trHL4Tt9kS8h_T8B_TOut9qTOsXwwndBa5Obh67c9G3_UTwZrrjksMErkGQ9G1XC8zouMUXL7MwdgCsHaoeNB8xfV8JVecRuko99cPW5EP2dADBu78lyQW27z5p4PbZ4QKzV8CUtxbI1UrtNWfpx_ESWX-GXY2COmvgfspM_JF1ZwvcEc7kzzTPMepxMCKrsWSsCAXiIGukeqPHST7kgYsOlb1Pk4Du2MP4UiZ0hn3DIcYmGGA
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
104.19.194.29 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
4b38731eb4624a3074e992b23aed8aca55d2318a26e48dfced511aaa44d52ad0

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/118.0.5993.117 Safari/537.36
accept-language
en-AU,en;q=0.9

Response headers

cf-ray
81e6556cdf755527-SYD
cf-version
1519-6345ed5
content-length
19558
content-type
text/html
date
Mon, 30 Oct 2023 20:16:02 GMT
referrer-policy
strict-origin-when-cross-origin
server
cloudflare
vary
Accept-Encoding

Redirect headers

access-control-allow-credentials
true
alt-svc
h3=":443"; ma=86400
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
cf-ray
81e6556c9cfbaac4-SYD
date
Mon, 30 Oct 2023 20:16:02 GMT
expires
Thu, 01 Jan 1970 00:00:01 GMT
location
https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b3a&redirect_url=%2F&meta=eyJraWQiOiIwOWZlZjA5NGNkMmU5YmMyMWMzZjc5MGQ3YzA3Mzg1ZmY2Yzc1NGE1ODNjNWIxNGQyMDUxYzUxNzg2N2JkYjk5IiwiYWxnIjoiUlMyNTYiLCJ0eXAiOiJKV1QifQ.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.cSLnpB2s6Va8XEutVijaVD7b6Y3NYxR5jauQcVcNlIJV1rsQC_KmXrr5GPu3opb5ic7rJMoWzUEAjunwb5hCesmfka_xS94-6ZK0trHL4Tt9kS8h_T8B_TOut9qTOsXwwndBa5Obh67c9G3_UTwZrrjksMErkGQ9G1XC8zouMUXL7MwdgCsHaoeNB8xfV8JVecRuko99cPW5EP2dADBu78lyQW27z5p4PbZ4QKzV8CUtxbI1UrtNWfpx_ESWX-GXY2COmvgfspM_JF1ZwvcEc7kzzTPMepxMCKrsWSsCAXiIGukeqPHST7kgYsOlb1Pk4Du2MP4UiZ0hn3DIcYmGGA
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=XKDtL0L0szJvJ5TqkV4JTlp0yeLmLlTSALowiP2N40kG9ggysee%2B3svw7eIvYxJdLJrTtVHzxzMCNycU82%2FBYzqFMqp0IxWpg624E2jkwIWEkYVe7cMXGiIg9w%3D%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
x-content-type-options
nosniff

Verdicts & Comments Add Verdict or Comment

1 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| documentPictureInPicture

1 Cookies

Domain/Path Name / Value
bozza.au/ Name: CF_AppSession
Value: n5293b0c0736b2ce5

1 Console Messages

Source Level URL
Text
network error URL: https://bruteforcegroup.cloudflareaccess.com/cdn-cgi/access/login/bozza.au?kid=4b9ad4cc53c2787fae119b67ee9bf240a551a7bbda454b70cc8bc5efc6c05b3a&redirect_url=%2F&meta=eyJraWQiOiIwOWZlZjA5NGNkMmU5YmMyMWMzZjc5MGQ3YzA3Mzg1ZmY2Yzc1NGE1ODNjNWIxNGQyMDUxYzUxNzg2N2JkYjk5IiwiYWxnIjoiUlMyNTYiLCJ0eXAiOiJKV1QifQ.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.cSLnpB2s6Va8XEutVijaVD7b6Y3NYxR5jauQcVcNlIJV1rsQC_KmXrr5GPu3opb5ic7rJMoWzUEAjunwb5hCesmfka_xS94-6ZK0trHL4Tt9kS8h_T8B_TOut9qTOsXwwndBa5Obh67c9G3_UTwZrrjksMErkGQ9G1XC8zouMUXL7MwdgCsHaoeNB8xfV8JVecRuko99cPW5EP2dADBu78lyQW27z5p4PbZ4QKzV8CUtxbI1UrtNWfpx_ESWX-GXY2COmvgfspM_JF1ZwvcEc7kzzTPMepxMCKrsWSsCAXiIGukeqPHST7kgYsOlb1Pk4Du2MP4UiZ0hn3DIcYmGGA
Message:
Failed to load resource: the server responded with a status of 500 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

bozza.au
bruteforcegroup.cloudflareaccess.com
104.19.194.29
104.21.55.159
4b38731eb4624a3074e992b23aed8aca55d2318a26e48dfced511aaa44d52ad0