robloxexploiting.xyz
Open in
urlscan Pro
2606:4700:3037::6815:4b50
Public Scan
Submission Tags: phishingrod
Submission: On August 18 via api from DE — Scanned from DE
Summary
TLS certificate: Issued by WE1 on August 18th 2024. Valid for: 3 months.
This is the only time robloxexploiting.xyz was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 2606:4700:303... 2606:4700:3037::6815:4b50 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:5f29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:5e29 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
9 | 4 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
robloxexploiting.xyz
robloxexploiting.xyz |
59 KB |
2 |
cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 3877 |
15 KB |
9 | 2 |
Domain | Requested by | |
---|---|---|
5 | robloxexploiting.xyz |
robloxexploiting.xyz
|
2 | challenges.cloudflare.com |
robloxexploiting.xyz
challenges.cloudflare.com |
9 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.cloudflare.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
robloxexploiting.xyz WE1 |
2024-08-18 - 2024-11-16 |
3 months | crt.sh |
challenges.cloudflare.com E5 |
2024-07-17 - 2024-10-15 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://robloxexploiting.xyz/
Frame ID: 93991EA8F82893BA8FAD3B6AEE705C17
Requests: 8 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/6ixk9/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/
Frame ID: B9D651F8944182A75CF133C8A5E2D36E
Requests: 1 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Title: Cloudflare
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
9 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
robloxexploiting.xyz/ |
18 KB 11 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
v1
robloxexploiting.xyz/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/ |
92 KB 35 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
challenges.cloudflare.com/turnstile/v0/g/ba7376691753/ |
44 KB 15 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
robloxexploiting.xyz/ |
564 B 564 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
a2af24f3-c3d2-4577-8c13-baa92d9e142f
https://robloxexploiting.xyz/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
robloxexploiting.xyz/ |
564 B 0 |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
97e60fa2acd9e20
robloxexploiting.xyz/cdn-cgi/challenge-platform/h/g/flow/ov1/1810248858:1723955045:4ihZI535GVvwIak6UDXDqd7DQOKysqIQAA9p04EHeqY/8b4f76658c4b39c1/ |
16 KB 13 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
/
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/6ixk9/0x4AAAAAAADnPIDROrmt1Wwj/light/fbE/normal/auto/ Frame B9D6 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
ba834691-34b0-4dd1-a29e-e86be3b98b84
https://robloxexploiting.xyz/ |
80 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
18 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| _cf_chl_opt function| mqwOs0 function| esos5 function| uwsb2 object| iuZUa5 object| sDbs2 function| IbcA8 boolean| fYJW0 function| jpOCF7 function| LAEiT8 function| wcfXJ4 object| NNssA6 number| DCxSI2 object| angular object| turnstile boolean| Ndtwf7 string| XqHFR6 boolean| mUrlk40 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
robloxexploiting.xyz
2606:4700:3037::6815:4b50
2606:4700::6812:5e29
2606:4700::6812:5f29
14ef39aa8b44bdaf85f71e9d2a1ece8ad6181ffdffa7eb26feac6ebb617b7cca
2341048aac16fda54954954cbd93dc9ed961cadbd1bd94bcbde345439a42e196
3c8cc37a98346bd0123b35e5ccd87bd07d69914dae04f8b49f61c150d96e9d1f
7c378a64a8916499372b3021c07797d63fc3914efd9ec6ab15ba69e6fc5c1efd
8860e7fef89219a219cb11d18bd8e4a322f32072613f86e935e7fe162ab69c04
cc2d28061583e6ee860682c1decc60fbd5cf2de51a8c72ec06a24fcae3281cf3
f3418640c1204265881221580b9d1554424f6ed49549d408da50c690ab29f400