c.axya.xyz
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
Submission: On March 22 via manual from JP — Scanned from NL
Summary
This is the only time c.axya.xyz was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
11 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
axya.xyz
c.axya.xyz |
833 KB |
11 | 1 |
Domain | Requested by | |
---|---|---|
11 | c.axya.xyz |
c.axya.xyz
|
11 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
matomo.org |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://c.axya.xyz/
Frame ID: 7D83C204C932E71DCD9AA1232AB1AA38
Requests: 11 HTTP requests in this frame
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
c.axya.xyz/ |
107 KB 34 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
c.axya.xyz/ |
437 KB 76 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
c.axya.xyz/ |
2 MB 527 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
c.axya.xyz/ |
61 B 986 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
c.axya.xyz/ |
284 KB 62 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
c.axya.xyz/ |
237 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
index.php
c.axya.xyz/ |
347 KB 64 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.svg
c.axya.xyz/plugins/Morpheus/images/ |
13 KB 8 KB |
Image
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
loading-blue.gif
c.axya.xyz/plugins/Morpheus/images/ |
723 B 1 KB |
Image
image/gif |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H/1.1 |
/
c.axya.xyz/ |
230 B 981 B |
XHR
application/json |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
matomo.woff2
c.axya.xyz/plugins/Morpheus/fonts/ |
11 KB 12 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
120 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
boolean| credentialless object| piwik object| translations object| piwik_translations function| _get function| _createClass function| _possibleConstructorReturn function| _inherits function| _classCallCheck function| Component function| docHandleKeydown function| docHandleKeyup function| docHandleFocus function| docHandleBlur function| getTime object| $jscomp object| $jscomp$this object| Vue function| QRCode function| _pk_translate function| isEnterKey function| isEscapeKey object| broadcast object| Piwik_Popover object| DataTable_RowActions_Registry function| DataTable_RowAction function| DataTable_RowActions_RowEvolution function| initTopControls function| toggleCalendar function| selectPeriodRadioButton function| blockPropegation object| NumberFormatter function| rowEvolutionGetMetricNameFromRow function| JQPlotExternalSeriesToggle function| RowEvolutionSeriesToggle function| widgetsHelper function| DataTable_RowActions_Transitions function| Piwik_Transitions function| Piwik_Transitions_Canvas function| Piwik_Transitions_Model function| Piwik_Transitions_Ajax function| createDashboard function| makeSelectorLastId function| resetDashboard function| renameDashboard function| removeDashboard function| showChangeDashboardLayoutDialog function| showEmptyDashboardNotification function| setAsDefaultWidgets function| copyDashboardToUser function| onClickPause function| onClickPlay object| SegmentedVisitorLog function| initializeVisitorActions function| DataTable_RowActions_Overlay object| Overlay_Helper object| tourEngagement object| PagePerformance function| $ function| jQuery function| cash object| M object| Waves object| jQBrowser boolean| jquery_dotdotdot_js function| sprintf function| vsprintf function| Mousetrap object| angular function| iFrameResize object| Visibility function| chroma object| tslib function| vueSanitize function| require object| piwikHelper function| initializeSparklines object| anchorLinkFix object| Piwik_Transitions_Util object| SEOWidget object| bruteForceLog object| twoFactorAuth function| eve function| Raphael function| kartograph object| $K function| drawStackedBars object| UserCountryMap function| Segmentation boolean| hasBlockedContent object| globalAjaxQueue function| ajaxHelper object| CoreHome object| CorePluginsAdmin object| CoreAdminHome object| CoreVisualizations object| Widgetize object| Transitions object| LanguagesManager object| Dashboard object| MultiSites object| Referrers object| Goals object| UserCountry object| GeoIp2 object| Feedback object| TwoFactorAuth object| UsersManager object| SitesManager object| resetReportParametersFunctions object| updateReportParametersFunctions object| getReportParametersFunctions object| ScheduledReports object| Live object| SegmentEditor object| PrivacyManager object| MobileMessaging object| Marketplace object| CustomDimensions object| Materialize1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
c.axya.xyz/ | Name: MATOMO_SESSID Value: 1se1e5508jscfq9bovvlq50ceo |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'self' 'unsafe-inline' 'unsafe-eval'; img-src 'self' 'unsafe-inline' 'unsafe-eval' data:; |
X-Frame-Options | sameorigin |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
c.axya.xyz
2a06:98c1:3120::3
12518da53dafffc151950a0494cec68ff63445152c0eb152a8e9e4a3c8989b1a
13154b0a5bbc1119e702d917a71c150f8869d3ef78ac4239b6c86d6d0eb6e880
2b1aa378eb98cbf683a3e49b280776549384af2688577ebaf7f0416f056ec15f
34d716d1d0bc04914c6d7c41d4ad05261e0c9239b61f465304b006d16365bdfa
4745b66e5b89ddec89620bc9bf9aa8dc3c4ab0f0610d83be1e075d673ad24e81
48403613babe5d7003f579a5d839c4e54077c08921c8f68b27e8ce99bf021263
6b0499abba202a0cb552dcc062a1349de3668f29ad86a98c84125be5dde3b022
adf71f06caff6bbf9e745fffbc0ea0a0a2764e2b2e7e384960fdc7548f805fac
c266039bad40412ed4f64d9d8cf1393b08214d22d91b9b4f034ffb6ab280ce20
f6635577bee327a975e2295b272080abd1d6b4c417d301153d8fe42c3b40dc97
f769456dd81612167f01e5397185e928eac513656ca4fe1a832c5cb9aab72e87