azigun.online
Open in
urlscan Pro
2606:4700:3033::ac43:da0f
Public Scan
Effective URL: https://azigun.online/opt/out
Submission Tags: 0xscam
Submission: On October 31 via api from US — Scanned from DE
Summary
TLS certificate: Issued by WE1 on October 31st 2024. Valid for: 3 months.
This is the only time azigun.online was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 8 | 2606:4700:303... 2606:4700:3033::ac43:da0f | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:803::200a | 15169 (GOOGLE) (GOOGLE) | |
7 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
azigun.online
2 redirects
azigun.online |
189 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 30 |
1 KB |
7 | 2 |
Domain | Requested by | |
---|---|---|
8 | azigun.online |
2 redirects
azigun.online
|
1 | fonts.googleapis.com |
azigun.online
|
7 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
azigun.online WE1 |
2024-10-31 - 2025-01-29 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-10-07 - 2024-12-30 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://azigun.online/opt/out
Frame ID: 18761D9F22C41B734666497527F019BC
Requests: 6 HTTP requests in this frame
Frame:
https://azigun.online/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/main.js
Frame ID: B00679653D9505BCF32D678F74318F4A
Requests: 2 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://azigun.online/
HTTP 302
http://azigun.online/opt/out HTTP 307
https://azigun.online/opt/out Page URL
Detected technologies
Google Font API (Font Scripts) ExpandDetected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://azigun.online/
HTTP 302
http://azigun.online/opt/out HTTP 307
https://azigun.online/opt/out Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 4- https://azigun.online/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://azigun.online/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/main.js
7 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
out
azigun.online/opt/ Redirect Chain
|
7 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
2 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.css
azigun.online/build/css/ |
23 KB 4 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
opt_out.js
azigun.online/build/ |
384 KB 103 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
3 KB 0 |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
azigun.online/cdn-cgi/challenge-platform/h/b/scripts/jsd/22755d9a86c9/ Frame B006 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
flags.007b2705.png
azigun.online/build/images/ |
69 KB 70 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
8db517f4baad0151
azigun.online/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame B006 |
0 1 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| intlTelInputGlobals object| intlTelInputUtils object| iti2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
azigun.online/ | Name: PHPSESSID Value: ohbcm152aeftbl58e2a27seper |
|
.azigun.online/ | Name: cf_clearance Value: gCZxTFG0Ug3sxPfrSu9fP92rYTK2A4MqJBWvvNAmWZo-1730392897-1.2.1.1-pJ6xr2gHPWLnQRAQpKELlQTSgdwhb.eE4TFre7oy99KCMmrff5MlPgT91DJ2lVxVqAXM94ARZ.CX.B3VOLJhvuWe7usNDHwA8vJNEqwI6tCv7wKH36kxfxf9eQwYGqPhVXxlWo16_G81E4dYqYLG4PzCNj3xjIYBhUUFcz4UoDf05AMzTyBo7ThcecWzanUlXEtsR.Un9W6Rn0HGLdD0Ke9bIlkTmdxo8z2aApXX6gYp7o88h.cgd4kmgeNJnlzu4ZCaqqz_DEjtdLjgx46a6WUGzqI0YN1yE9bgSuwd0CgsHZKTRntdghul8_3jPyJJve9Pgv0UeemCFimrx5s3qDZIlmEkLrmDOLKP7mNyJGjpr_KFGwR4ZdpOL8ZJbrhK |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
azigun.online
fonts.googleapis.com
2606:4700:3033::ac43:da0f
2a00:1450:4001:803::200a
0a012cf808a24573168308916092d2d4bd3f2b4af8e16b59167013cc77acee55
623388f11311de0fd5347d31bd906b6891e23a49d096202a44ffbe4379b94eee
67e8cde92a55370e057b24aa83ee3c4b258285ed80e2e01cd320c28f7a3f5521
72b78573841119b6e3fe3f7ee0845e126fb525a6d7f05c7268306a458a726fdc
a48d7835b373a6ee3037943f83c3bda28e7aaafedfbbf333574b3c0ea6cc8650
c29e9fa4775e336b38c5c64cdd3d4d36e85fb8b9113eeadb0cd5f2b0478ad829
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f32659b1d5b53b71350c8e75be2210c905641e8923d7bc629fbfb30cdfd26c06