URL: https://vpx.ra0didate.com/cdn-cgi/phish-bypass?atok=.g7AShMXowSjv8XhWPxTfJ54609wy6B5Z0tk_HOBCV4-1729597558-0.0.1.1-%2F
Submission: On October 23 via api from CA — Scanned from CA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 2606:4700:3033::ac43:a861, located in United States and belongs to CLOUDFLARENET, US. The main domain is vpx.ra0didate.com.
TLS certificate: Issued by WE1 on August 31st 2024. Valid for: 3 months.
This is the only time vpx.ra0didate.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 2606:4700:303... 13335 (CLOUDFLAR...)
2 1
Apex Domain
Subdomains
Transfer
2 ra0didate.com
vpx.ra0didate.com
3 KB
2 1
Domain Requested by
2 vpx.ra0didate.com
2 1

This site contains no links.

Subject Issuer Validity Valid
ra0didate.com
WE1
2024-08-31 -
2024-11-29
3 months crt.sh

This page contains 1 frames:

Primary Page: https://vpx.ra0didate.com/cdn-cgi/phish-bypass?atok=.g7AShMXowSjv8XhWPxTfJ54609wy6B5Z0tk_HOBCV4-1729597558-0.0.1.1-%2F
Frame ID: 55ADB962C9DCE7E51A7A5023D449AA9A
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

403 Forbidden

Page Statistics

2
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

3 kB
Transfer

5 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request phish-bypass
vpx.ra0didate.com/cdn-cgi/
553 B
293 B
Document
General
Full URL
https://vpx.ra0didate.com/cdn-cgi/phish-bypass?atok=.g7AShMXowSjv8XhWPxTfJ54609wy6B5Z0tk_HOBCV4-1729597558-0.0.1.1-%2F
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3033::ac43:a861 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
982b986bb578e137f062099427a8caec3c501c84a9e4b22369ebd2badec42fe7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36

Response headers

cf-ray
8d6eb6f94ae980cd-EWR
content-encoding
gzip
content-type
text/html
date
Wed, 23 Oct 2024 03:42:01 GMT
server
cloudflare
x-content-type-options
nosniff
x-frame-options
DENY
favicon.ico
vpx.ra0didate.com/
5 KB
3 KB
Other
General
Full URL
https://vpx.ra0didate.com/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
2606:4700:3033::ac43:a861 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
70ee1901c279ef2a2a752660863ee04a3c6d27a0e45bdc00056dd005e822f593
Security Headers
Name Value
X-Frame-Options SAMEORIGIN

Request headers

User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/129.0.0.0 Safari/537.36
Referer
https://vpx.ra0didate.com/cdn-cgi/phish-bypass?atok=.g7AShMXowSjv8XhWPxTfJ54609wy6B5Z0tk_HOBCV4-1729597558-0.0.1.1-%2F

Response headers

nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
content-encoding
zstd
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=h5L39wM7ZegXYbwq%2BO6OdxtZKFeEWltijgslu296oy9Oh4rXZsRM%2BkZuZXev13sdQzGZwO7xQwQe7t2K4zel9QDoqXAPdLDD4wkiD%2FGxQDhkdUb6fv9Nv8piMCP0lTeu%2Bq5ELtKoeai0fjBJewNurg%3D%3D"}],"group":"cf-nel","max_age":604800}
cf-ray
8d6eb6f9db5180cd-EWR
alt-svc
h3=":443"; ma=86400
server-timing
cfL4;desc="?proto=QUIC&rtt=54595&sent=13&recv=11&lost=0&retrans=0&sent_bytes=4495&recv_bytes=4915&delivery_rate=19497&cwnd=12000&unsent_bytes=0&cid=6270cba0365f3b73&ts=169&x=1", cfExtPri, cfHdrFlush;dur=0
date
Wed, 23 Oct 2024 03:42:01 GMT
content-type
text/html; charset=UTF-8
vary
Accept-Encoding
server
cloudflare
priority
u=1,i
x-frame-options
SAMEORIGIN

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://vpx.ra0didate.com/cdn-cgi/phish-bypass?atok=.g7AShMXowSjv8XhWPxTfJ54609wy6B5Z0tk_HOBCV4-1729597558-0.0.1.1-%2F
Message:
Failed to load resource: the server responded with a status of 403 ()

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options DENY

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

vpx.ra0didate.com
2606:4700:3033::ac43:a861
70ee1901c279ef2a2a752660863ee04a3c6d27a0e45bdc00056dd005e822f593
982b986bb578e137f062099427a8caec3c501c84a9e4b22369ebd2badec42fe7