axomah.online
Open in
urlscan Pro
2606:4700:3035::ac43:ac8a
Public Scan
Effective URL: https://axomah.online/opt/out
Submission Tags: 0xscam
Submission: On October 23 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on October 23rd 2024. Valid for: 3 months.
This is the only time axomah.online was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 2606:4700:303... 2606:4700:3035::ac43:ac8a | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:829::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
axomah.online
2 redirects
axomah.online |
189 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 |
1 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
8 | axomah.online |
2 redirects
axomah.online
|
1 | fonts.googleapis.com |
axomah.online
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
axomah.online WE1 |
2024-10-23 - 2025-01-21 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://axomah.online/opt/out
Frame ID: DB669D2FE1D8F5111BCF9EC7C45B548D
Requests: 6 HTTP requests in this frame
Frame:
https://axomah.online/cdn-cgi/challenge-platform/h/g/scripts/jsd/f2bbd6738e15/main.js
Frame ID: AE7D4E9D8D1B89BFE9AF84E9BAB50AD6
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://axomah.online/
HTTP 302
http://axomah.online/opt/out HTTP 307
https://axomah.online/opt/out Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://axomah.online/
HTTP 302
http://axomah.online/opt/out HTTP 307
https://axomah.online/opt/out Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://axomah.online/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://axomah.online/cdn-cgi/challenge-platform/h/g/scripts/jsd/f2bbd6738e15/main.js
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
out
axomah.online/opt/ Redirect Chain
|
7 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.css
axomah.online/build/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.js
axomah.online/build/ |
384 KB 103 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
2 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
axomah.online/cdn-cgi/challenge-platform/h/g/scripts/jsd/f2bbd6738e15/ Frame AE7D Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flags.007b2705.png
axomah.online/build/images/ |
69 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8d7359348a1faad4
axomah.online/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame AE7D |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| intlTelInputGlobals object| intlTelInputUtils object| iti2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
axomah.online/ | Name: PHPSESSID Value: qomlb2ren0r3id0541rt4vdv23 |
|
.axomah.online/ | Name: cf_clearance Value: S5rrN9901x6K.RMmm1V78T1CVPoOdguNieOs9Rwba1c-1729703510-1.2.1.1-XTMV0IyM38SD7JghbGcSD0QEm448umRGymFBuyfCYVM1a9wmkpZc7oxs5IAJ29.pzcp9cRiERWvpM2eH_RRHUg2jYKN3vfquVohOlWamHUfUCx6pz_juViDOp1qC401cvVgkoNFbSHYe4M1Z9suIJNsJ341s0hXHy9OuQryM0E5hyvcMPZ4VMopdPdVGNJqTkEKCBntyfnVlCgZ2sWtRhkESA28MR53HejqJgKCdRv3EKxihC.LmOrq6f1A1SpsBfm_vhHjUiCiCRshuDg4vVheSeLZvf1SBgC07x19KIOpetBM9XNMA0fIUfL9OW6i6S11uFI9kRImueHzPEshJiAIM33uXowz_vH7DiztePNFoDMYl.m6RBkRknS4ilEZQ |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
axomah.online
fonts.googleapis.com
2606:4700:3035::ac43:ac8a
2a00:1450:4001:829::200a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