jlfaw.info
Open in
urlscan Pro
172.67.217.185
Public Scan
Effective URL: https://jlfaw.info/opt/out
Submission Tags: 0xscam
Submission: On December 04 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on December 4th 2024. Valid for: 3 months.
This is the only time jlfaw.info was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:303... 2606:4700:3036::ac43:d9b9 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 7 | 172.67.217.185 172.67.217.185 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
jlfaw.info
2 redirects
jlfaw.info |
190 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 29 |
1 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
8 | jlfaw.info |
2 redirects
jlfaw.info
|
1 | fonts.googleapis.com |
jlfaw.info
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
jlfaw.info WE1 |
2024-12-04 - 2025-03-04 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-21 - 2025-01-13 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://jlfaw.info/opt/out
Frame ID: E60AEB914D1F8922DE06F4AECA1B5953
Requests: 6 HTTP requests in this frame
Frame:
https://jlfaw.info/cdn-cgi/challenge-platform/h/b/scripts/jsd/a6e12e96a2d5/main.js
Frame ID: 88AE835CA134C54B30BF8207870F7EE5
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://jlfaw.info/
HTTP 302
http://jlfaw.info/opt/out HTTP 307
https://jlfaw.info/opt/out Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://jlfaw.info/
HTTP 302
http://jlfaw.info/opt/out HTTP 307
https://jlfaw.info/opt/out Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://jlfaw.info/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://jlfaw.info/cdn-cgi/challenge-platform/h/b/scripts/jsd/a6e12e96a2d5/main.js
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
out
jlfaw.info/opt/ Redirect Chain
|
7 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.css
jlfaw.info/build/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.js
jlfaw.info/build/ |
384 KB 103 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
jlfaw.info/cdn-cgi/challenge-platform/h/b/scripts/jsd/a6e12e96a2d5/ Frame 88AE Redirect Chain
|
9 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flags.007b2705.png
jlfaw.info/build/images/ |
69 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8ecd62237e01d5bc
jlfaw.info/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame 88AE |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| intlTelInputGlobals object| intlTelInputUtils object| iti2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
jlfaw.info/ | Name: PHPSESSID Value: fi9gmkeltuj4m3m5gs1hn6mqpm |
|
.jlfaw.info/ | Name: cf_clearance Value: kfMumHgx5SHOLcunOcoKnrBlh3IOCx.JB33G80.MXO8-1733331948-1.2.1.1-VC4.1_OK5VzQh8.bQ8OBG4k0FwpLaHzeDPd3j6RGXkAZ.8Gu9H4vg8IUaydzFuN2tjOYEnsNm6K29II64DrKUM1gRyLo.nM.3FPpWQPC0d2Af3DNrZSjN8ga3bpTzfpGadqHswZN5o9fGewUEAJaQq36H1l_T5baABAHFhhYhKLGurFTUMCJT7fryU9y8whI4UVkAO0HQqSVng1XZ_oyObNhnFusJGk0wiEux_qMZFyF08T3H5.i_hu8stJChYYXyW57ZE5S4GdVWLxKszvbwIf1GeC3FRSfGefc9KJSJiHjAlEk8ysNGpV5ma.8imeXTO.ExeeGGQ0RzPAoW26NLGoTNtwnVX.YsrKd1looHm6hn5fgQoTe6KtdBrBO0JZV |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
jlfaw.info
172.67.217.185
2606:4700:3036::ac43:d9b9
2a00:1450:4001:800::200a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