| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/030baf61-d9d9-4b37-8433-b66286958c2f | 188.114.97.1 | 500 Internal Server Error | 4.4 kB |
URL User Request GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/030baf61-d9d9-4b37-8433-b66286958c2f IP188.114.97.1:443
CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeHTML document, ASCII text, with very long lines (394) Hashb13e59046a577a2b69ebf40608bdf1e1 0ff3ddea67f42a9da45ab3afb6b7f0346ae62317 5f718c9ef0bf386c93153f4efeb51e6a4053ce16d226076278b343d222436d58
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /030baf61-d9d9-4b37-8433-b66286958c2f HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 500 Internal Server Error
date: Wed, 24 Apr 2024 20:35:48 GMT
content-type: text/html; charset=UTF-8
content-length: 4398
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=GiA1zcFWZcjJ9Y5AISrqnTb561T%2FQaRpjfgrDzpqMnQyhOJ3Klb5YjSvVeFRRctCyp92WCmNYnPE%2FwhfSwup6WnYxHEa205L%2B04fC0C0vGME0lVTPNCOTHnp3T%2Br28mGzni9m%2B%2FCueRi4WcDZjS8tZpG10UsIAneO%2BvpKhzuvQ4ZnZrp"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
x-frame-options: SAMEORIGIN
referrer-policy: same-origin
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
server: cloudflare
cf-ray: 8798e1c388157129-OSL
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/favicon.ico | 188.114.97.1 | 500 Internal Server Error | 4.4 kB |
URL GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/favicon.ico IP188.114.97.1:443
Requested byhttps://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/030baf61-d9d9-4b37-8433-b66286958c2f CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeHTML document, ASCII text, with very long lines (394) Hash53da77d6a9865b862cd19e8b69dea472 c56744652dd46a9cc100a19f54a22337e77541d6 286968116e42822ceafe349deb9b4f9bb3c972bcdb3b1f6610622978064d3587
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /favicon.ico HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/030baf61-d9d9-4b37-8433-b66286958c2f
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 500 Internal Server Error
date: Wed, 24 Apr 2024 20:35:48 GMT
content-type: text/html; charset=UTF-8
content-length: 4398
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s1fgytzwbOpDU01koRBJUPWNH5CODcUFpAg2gi0D8e%2F3L6rJt%2Bsd97vLNJES8%2B1Gr1vM7gVnh5nElyzjiyui4ECCQBuvgjWcY8iMiATKU6o8N5SSql3PNqTx%2BDJFVXIyIEo2VpdkixmLgV8esMgW8kMU78eOlaNX6vHv0HOmYdwC0Mg%2B"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
x-frame-options: SAMEORIGIN
referrer-policy: same-origin
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
server: cloudflare
cf-ray: 8798e1c4f9cd7129-OSL
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/cdn-cgi/styles/cf.errors.css | 188.114.97.1 | 200 OK | 24 kB |
URL GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/cdn-cgi/styles/cf.errors.css IP188.114.97.1:443
Requested byhttps://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/030baf61-d9d9-4b37-8433-b66286958c2f CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeASCII text, with very long lines (24050) Hash5e8c69a459a691b5d1b9be442332c87d f24dd1ad7c9080575d92a9a9a2c42620725ef836 84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /cdn-cgi/styles/cf.errors.css HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/030baf61-d9d9-4b37-8433-b66286958c2f
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 20:35:48 GMT
content-type: text/css
last-modified: Fri, 19 Apr 2024 20:54:07 GMT
etag: W/"6622d9ef-5df3"
server: cloudflare
cf-ray: 8798e1c4995a7129-OSL
x-frame-options: DENY
x-content-type-options: nosniff
vary: Accept-Encoding
expires: Wed, 24 Apr 2024 22:35:48 GMT
cache-control: max-age=7200, public
content-encoding: gzip
X-Firefox-Spdy: h2
|