Submitted URL: https://cracked.to/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Effective URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Submission: On July 25 via api from IT — Scanned from IT

Summary

This website contacted 4 IPs in 1 countries across 3 domains to perform 8 HTTP transactions. The main IP is 104.18.0.137, located in and belongs to CLOUDFLARENET, US. The main domain is cracked.io. The Cisco Umbrella rank of the primary domain is 713876.
TLS certificate: Issued by WE1 on June 21st 2024. Valid for: 3 months.
This is the only time cracked.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 104.26.3.183 13335 (CLOUDFLAR...)
4 104.18.0.137 13335 (CLOUDFLAR...)
1 104.18.95.41 13335 (CLOUDFLAR...)
1 104.18.94.41 13335 (CLOUDFLAR...)
8 4
Apex Domain
Subdomains
Transfer
4 cracked.io
cracked.io — Cisco Umbrella Rank: 713876
315 KB
2 cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 3877
15 KB
1 cracked.to
cracked.to
510 B
8 3
Domain Requested by
4 cracked.io cracked.io
2 challenges.cloudflare.com cracked.io
challenges.cloudflare.com
1 cracked.to 1 redirects
8 3

This site contains no links.

Subject Issuer Validity Valid
cracked.io
WE1
2024-06-21 -
2024-09-19
3 months crt.sh
challenges.cloudflare.com
E5
2024-07-17 -
2024-10-15
3 months crt.sh

This page contains 2 frames:

Primary Page: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Frame ID: 87CC6297743589F322328F039966C2D7
Requests: 10 HTTP requests in this frame

Frame: https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/zbfc6/0x4AAAAAAAAjq6WYeRDKmebM/light/fbE/normal/auto/
Frame ID: C2409B66EDD62F988F5C1C4F138C739B
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Cracked.to Under Attack

Page URL History Show full URLs

  1. https://cracked.to/Thread-Staff-Beware-of-fake-login-pages-phishing-sites HTTP 301
    https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites Page URL

Page Statistics

8
Requests

75 %
HTTPS

0 %
IPv6

3
Domains

3
Subdomains

4
IPs

1
Countries

359 kB
Transfer

751 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://cracked.to/Thread-Staff-Beware-of-fake-login-pages-phishing-sites HTTP 301
    https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

8 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Thread-Staff-Beware-of-fake-login-pages-phishing-sites
cracked.io/
Redirect Chain
  • https://cracked.to/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
  • https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
286 KB
135 KB
Document
General
Full URL
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.0.137 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
5f971fa32a16e65b2728a310183405ca33073e201900b79245aad4735c1b9a4d
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

accept-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
alt-svc
h3=":443"; ma=86400
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
cf-chl-out
4PfIpV9FKAmFF9ZqZm8z6WwzPFf2seQQBg/KWNyw/pfQM2OqtGjI9Gvf8E8od9zdbKlufD8TR4XXgTCDYaKVKN/VHU6NizP8WVSJUNSxvP2VpQVfkZHK8j9MDodtwXw6DTp2IgWLV7TOyiXEuGP8MQ==$XJEFQE/iPhCyUwYo1oswDw==
cf-mitigated
challenge
cf-ray
8a8a1c47ac697c52-PMO
content-encoding
br
content-security-policy-report-only
script-src 'none'; report-uri https://csp-reporting.cloudflare.com/cdn-cgi/script_monitor/report?m=9ABQi2Ep1pWIU9U4dMgumSC2sTMY3Q5DinDtDhH00rM-1721889122-1.0.1.1-zZE7.JNKzG6im7M7lWtErzKch1jLubmHL6IHu3F5AgcXYYN450lWZI1icanCTBlupXu.p_ZzoT7NCWKFQ2LE7B_bPYF.oKA72WXPhAYE0BL7GrJTLPYvQ9rKSchwbLhluyTS3BJbHvJhRkGmjNx.5Q; report-to cf-csp-endpoint
content-type
text/html; charset=UTF-8
critical-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policy
require-corp
cross-origin-opener-policy
same-origin
cross-origin-resource-policy
same-origin
date
Thu, 25 Jul 2024 06:32:02 GMT
expires
Thu, 01 Jan 1970 00:00:01 GMT
origin-agent-cluster
?1
permissions-policy
accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policy
same-origin
report-to
{"endpoints":[{"url":"https:\/\/csp-reporting.cloudflare.com\/cdn-cgi\/script_monitor\/report?m=9ABQi2Ep1pWIU9U4dMgumSC2sTMY3Q5DinDtDhH00rM-1721889122-1.0.1.1-zZE7.JNKzG6im7M7lWtErzKch1jLubmHL6IHu3F5AgcXYYN450lWZI1icanCTBlupXu.p_ZzoT7NCWKFQ2LE7B_bPYF.oKA72WXPhAYE0BL7GrJTLPYvQ9rKSchwbLhluyTS3BJbHvJhRkGmjNx.5Q"}],"group":"cf-csp-endpoint","max_age":86400}
server
cloudflare
strict-transport-security
max-age=15552000; includeSubDomains; preload
vary
Accept-Encoding
x-content-options
nosniff
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN

Redirect headers

alt-svc
h3=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
8a8a1c45bc217170-ATH
content-type
text/html
date
Thu, 25 Jul 2024 06:32:02 GMT
location
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FF94%2BDSGpAjDg%2BOQaTeVg3YbpkS9FDGHQ9ZZakJig9J61pIEvqBBvxY1DNeEnsAmH9v3kAxG8dp15mFnI5TZO66baK%2FpevcQWwV0MP5eWJpniDn1ZD5uCyYvoDE%3D"}],"group":"cf-nel","max_age":604800}
server
cloudflare
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
truncated
/
2 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b4136c019eeeedeb2f5734aa8cb60ba8a6472300eb2d47c50506ce1ebfc7a253

Request headers

Referer
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
image/svg+xml
truncated
/
15 KB
15 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
d4d87d1441760926962824d1c49ce424ba5a720b0802918a8df9d2689e586bc3

Request headers

Referer
Origin
https://cracked.io
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
font/woff
truncated
/
15 KB
15 KB
Font
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
295ca66040c814f49ad7253712965d6e7c1294c498c979a60435ec52236fe296

Request headers

Referer
Origin
https://cracked.io
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Type
font/woff
v1
cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/
90 KB
34 KB
Script
General
Full URL
https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Requested by
Host: cracked.io
URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.0.137 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a3057987a2d6f8f0e6b2f5e6232377736204706f2d51fc2365977c49c5f49ce3
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites?__cf_chl_rt_tk=FubDwbDg5xdXjK5aig_XfVwWwnwnACm51vUGNJxnyoQ-1721889122-0.0.1.1-5993
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Thu, 25 Jul 2024 06:32:02 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
content-encoding
br
server
cloudflare
content-type
application/javascript; charset=UTF-8
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
cf-ray
8a8a1c491db87c52-PMO
alt-svc
h3=":443"; ma=86400
api.js
challenges.cloudflare.com/turnstile/v0/b/bbfecc7f1c71/
43 KB
15 KB
Script
General
Full URL
https://challenges.cloudflare.com/turnstile/v0/b/bbfecc7f1c71/api.js?onload=ooiEk3&render=explicit
Requested by
Host: cracked.io
URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.95.41 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
a20ae8f3421682042d681bb7d09a6285bed4fc7bc03fedc91178576dd175490b

Request headers

Referer
Origin
https://cracked.io
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Thu, 25 Jul 2024 06:32:02 GMT
content-encoding
br
last-modified
Tue, 16 Jul 2024 01:52:55 GMT
server
cloudflare
vary
Accept-Encoding
content-type
application/javascript; charset=UTF-8
access-control-allow-origin
*
cache-control
max-age=31536000
cross-origin-resource-policy
cross-origin
cf-ray
8a8a1c49ba5c7940-PMO
alt-svc
h3=":443"; ma=86400
6d2111ef-6cdd-4672-a74c-4fd13ff46e43
https://cracked.io/
13 B
0
Other
General
Full URL
blob:https://cracked.io/6d2111ef-6cdd-4672-a74c-4fd13ff46e43
Requested by
Host: cracked.io
URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
8860e7fef89219a219cb11d18bd8e4a322f32072613f86e935e7fe162ab69c04

Request headers

Referer
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Length
13
Content-Type
text/javascript
favicon.ico
cracked.io/
283 KB
132 KB
Other
General
Full URL
https://cracked.io/favicon.ico
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.0.137 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
24ec38ca708f8a8c930e8811285ec214669ec2d4fcb479b3b368470a194701b5
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN

Request headers

Referer
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

date
Thu, 25 Jul 2024 06:32:02 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
x-content-options
nosniff
content-encoding
br
cross-origin-embedder-policy
require-corp
critical-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-resource-policy
same-origin
alt-svc
h3=":443"; ma=86400
cf-chl-out
YtvV6LJ6VBtXkkmFNELU9shQsuDhbt224gFDuTDhd8r03XdLetG44quKegFGffmntA0izKU0gk//MqyDF1QD7/XK7QFEtdXDlI0Zxv4xucD0KS5Sr10EyjfGKxU7VVO0WbiJ27iYEkcU7nsrMAEwqA==$V7lqiPBuw3lmolOp1HpVlA==
referrer-policy
same-origin
accept-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Full-Version, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-opener-policy
same-origin
cf-mitigated
challenge
server
cloudflare
x-frame-options
SAMEORIGIN
vary
Accept-Encoding
content-type
text/html; charset=UTF-8
origin-agent-cluster
?1
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
permissions-policy
accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
cf-ray
8a8a1c4a2e8d7c52-PMO
expires
Thu, 01 Jan 1970 00:00:01 GMT
cb25e6dac421ea6
cracked.io/cdn-cgi/challenge-platform/h/b/flow/ov1/852227082:1721885641:u-X6nRoJoqQRVCt20Oqp-SlUI4uBCZBAszJWVJXgOxg/8a8a1c47ac697c52/
17 KB
13 KB
XHR
General
Full URL
https://cracked.io/cdn-cgi/challenge-platform/h/b/flow/ov1/852227082:1721885641:u-X6nRoJoqQRVCt20Oqp-SlUI4uBCZBAszJWVJXgOxg/8a8a1c47ac697c52/cb25e6dac421ea6
Requested by
Host: cracked.io
URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.0.137 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
1bb007bcee367bb65d4852ad247ee808eb5a70975be97675099cd2422f448578
Security Headers
Name Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff

Request headers

Referer
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36
CF-Challenge
cb25e6dac421ea6
Content-type
application/x-www-form-urlencoded

Response headers

date
Thu, 25 Jul 2024 06:32:02 GMT
strict-transport-security
max-age=15552000; includeSubDomains; preload
x-content-type-options
nosniff
content-encoding
br
server
cloudflare
content-type
text/plain; charset=UTF-8
cf-ray
8a8a1c4a3e977c52-PMO
alt-svc
h3=":443"; ma=86400
cf-chl-gen
Y4KXvxrg9NZEq47bftn7u0AhmWpUPOTxSzYcbIDJzom6aPjG+UILuoVJN9hGvyHeZPmRvDDH8w==$QG8qnBBSp5J687bS
/
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/zbfc6/0x4AAAAAAAAjq6WYeRDKmebM/light/fbE/normal/auto/ Frame C240
0
0
Document
General
Full URL
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/zbfc6/0x4AAAAAAAAjq6WYeRDKmebM/light/fbE/normal/auto/
Requested by
Host: challenges.cloudflare.com
URL: https://challenges.cloudflare.com/turnstile/v0/b/bbfecc7f1c71/api.js?onload=ooiEk3&render=explicit
Protocol
H3
Security
QUIC, , AES_128_GCM
Server
104.18.94.41 -, , ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
Security Headers
Name Value
Content-Security-Policy frame-src https://challenges.cloudflare.com/; base-uri 'self'

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

accept-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
alt-svc
h3=":443"; ma=86400
cache-control
private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
cf-ray
8a8a1c4b2e7e7951-PMO
content-encoding
br
content-security-policy
frame-src https://challenges.cloudflare.com/; base-uri 'self'
content-type
text/html; charset=UTF-8
critical-ch
Sec-CH-UA-Bitness, Sec-CH-UA-Arch, Sec-CH-UA-Mobile, Sec-CH-UA-Model, Sec-CH-UA-Platform-Version, Sec-CH-UA-Full-Version-List, Sec-CH-UA-Platform, Sec-CH-UA, UA-Bitness, UA-Arch, UA-Full-Version, UA-Mobile, UA-Model, UA-Platform-Version, UA-Platform, UA
cross-origin-embedder-policy
require-corp
cross-origin-opener-policy
same-origin
cross-origin-resource-policy
cross-origin
date
Thu, 25 Jul 2024 06:32:03 GMT
document-policy
js-profiling
origin-agent-cluster
?1
permissions-policy
accelerometer=(),autoplay=(),browsing-topics=(),camera=(),clipboard-read=(),clipboard-write=(),geolocation=(),gyroscope=(),hid=(),interest-cohort=(),magnetometer=(),microphone=(),payment=(),publickey-credentials-get=(),screen-wake-lock=(),serial=(),sync-xhr=(),usb=()
referrer-policy
same-origin
server
cloudflare
9e7e0378-a6ea-4a6a-b0b9-2de2bbc57454
https://cracked.io/
80 B
0
Other
General
Full URL
blob:https://cracked.io/9e7e0378-a6ea-4a6a-b0b9-2de2bbc57454
Protocol
BLOB
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
f3418640c1204265881221580b9d1554424f6ed49549d408da50c690ab29f400

Request headers

Referer
https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
User-Agent
Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.36

Response headers

Content-Length
80
Content-Type
text/javascript

Verdicts & Comments Add Verdict or Comment

17 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| _cf_chl_opt function| ebSg5 function| BNnn4 function| dHNZt7 function| ooiEk3 boolean| BHZR0 function| yBrQw2 function| gfNxB8 function| tlPF8 object| KbqQ2 object| fqpQ7 object| JwIp7 number| cvLh2 object| angular object| turnstile boolean| bSFP6 string| lHEy2

0 Cookies

20 Console Messages

Source Level URL
Text
network error URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Message:
Failed to load resource: the server responded with a status of 403 ()
security error URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites(Line 28)
Message:
[Report Only] Refused to execute inline script because it violates the following Content Security Policy directive: "script-src 'none'". Either the 'unsafe-inline' keyword, a hash ('sha256-hmEKkSK89eEBR4RpWfWx7z5mxU20O10kY6AYheEZfxQ='), or a nonce ('nonce-...') is required to enable inline execution.
security error URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites(Line 28)
Message:
[Report Only] Refused to load the script 'https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52' because it violates the following Content Security Policy directive: "script-src 'none'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to create a worker from 'blob:https://cracked.io/6d2111ef-6cdd-4672-a74c-4fd13ff46e43' because it violates the following Content Security Policy directive: "script-src 'none'". Note that 'worker-src' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to load the script 'https://challenges.cloudflare.com/turnstile/v0/b/bbfecc7f1c71/api.js?onload=ooiEk3&render=explicit' because it violates the following Content Security Policy directive: "script-src 'none'". Note that 'script-src-elem' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Message:
[Report Only] Refused to create a worker from 'blob:https://cracked.io/6d2111ef-6cdd-4672-a74c-4fd13ff46e43' because it violates the following Content Security Policy directive: "script-src 'none'". Note that 'worker-src' was not explicitly set, so 'script-src' is used as a fallback.
network error URL: https://cracked.io/favicon.ico
Message:
Failed to load resource: the server responded with a status of 403 ()
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to create a worker from 'blob:https://cracked.io/9e7e0378-a6ea-4a6a-b0b9-2de2bbc57454' because it violates the following Content Security Policy directive: "script-src 'none'". Note that 'worker-src' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/Thread-Staff-Beware-of-fake-login-pages-phishing-sites
Message:
[Report Only] Refused to create a worker from 'blob:https://cracked.io/9e7e0378-a6ea-4a6a-b0b9-2de2bbc57454' because it violates the following Content Security Policy directive: "script-src 'none'". Note that 'worker-src' was not explicitly set, so 'script-src' is used as a fallback.
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".
security error URL: https://cracked.io/cdn-cgi/challenge-platform/h/b/orchestrate/chl_page/v1?ray=8a8a1c47ac697c52
Message:
[Report Only] Refused to evaluate a string as JavaScript because 'unsafe-eval' is not an allowed source of script in the following Content Security Policy directive: "script-src 'none'".

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=15552000; includeSubDomains; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN