| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/ddb4b3cb-0242-47b7-a57d-4d3fc445c035 | 188.114.97.1 | 500 Internal Server Error | 4.4 kB |
URL User Request GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/ddb4b3cb-0242-47b7-a57d-4d3fc445c035 IP188.114.97.1:443
CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeHTML document, ASCII text, with very long lines (394) Hash6e0828404aba02bf2c8f7c8ac77eb8fe 7b6e06f8ef303fa737c5be0ce0d9521156bb27f2 2024fb7f24b3731fad15273c329f5705013977cac709d4c2fd32d99eb90a1ff5
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /ddb4b3cb-0242-47b7-a57d-4d3fc445c035 HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 500 Internal Server Error
date: Wed, 24 Apr 2024 20:35:46 GMT
content-type: text/html; charset=UTF-8
content-length: 4398
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=oNMSYRfGbcl5GayHkR%2BEr01BKTvLMkyoXC7HIt4Dtfd0BA815qlo47uB%2FQxJuOYFp4bxRC7fBFr31bs3x0Zav26zyF9sF6U6WLI6fcome2jXii9YEk52W6WINPYGdM3Cwzspt%2FDkUCoqOHl1ZxAiyuG62GkKuhLHmza3M%2FBFQM76CDk0"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
x-frame-options: SAMEORIGIN
referrer-policy: same-origin
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
server: cloudflare
cf-ray: 8798e1b79b4f569d-OSL
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/favicon.ico | 188.114.97.1 | 500 Internal Server Error | 4.4 kB |
URL GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/favicon.ico IP188.114.97.1:443
Requested byhttps://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/ddb4b3cb-0242-47b7-a57d-4d3fc445c035 CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeHTML document, ASCII text, with very long lines (394) Hash964126f4970ee85c254022d3958b7648 1ecbdcd81cde9fb229abecac52fee070f58383db beff5dd328b5fdcd58836f54e27fa73a9a3d6a59a05f606a13ea3634e36405a9
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /favicon.ico HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/ddb4b3cb-0242-47b7-a57d-4d3fc445c035
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 500 Internal Server Error
date: Wed, 24 Apr 2024 20:35:46 GMT
content-type: text/html; charset=UTF-8
content-length: 4398
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ag%2FEe%2FRn6Id9je6ikAMJHW9Zleyb2B4%2BzQufUF968qRQ3b9hTxG8O8m6vKDWZU1boiNMF7wI6bezazd32QB5dUvYgAXuk4C6nbty0MOGmad4%2BO3NPooZznlWZxHtVWN59W6bw%2F78q5aUQZahjrYBEgdx666JSE4VIa5932nN0QwLZm0F"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
x-frame-options: SAMEORIGIN
referrer-policy: same-origin
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
server: cloudflare
cf-ray: 8798e1ba4f5a569d-OSL
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/cdn-cgi/styles/cf.errors.css | 188.114.97.1 | 200 OK | 5.0 kB |
URL GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/cdn-cgi/styles/cf.errors.css IP188.114.97.1:443
Requested byhttps://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/ddb4b3cb-0242-47b7-a57d-4d3fc445c035 CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typegzip compressed data, from Unix Hash824894e1ab719f4f9aa35a02ad2b0ac5 d33b73946335ffa82ce1edfd9556448f8ed2c2e9 74ea2f4c5a72aefd07a10a6b7ea355f4d15304d6a51b9b0b8e1dcb6989f7767e
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /cdn-cgi/styles/cf.errors.css HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/ddb4b3cb-0242-47b7-a57d-4d3fc445c035
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 200 OK
date: Wed, 24 Apr 2024 20:35:46 GMT
content-type: text/css
last-modified: Tue, 23 Apr 2024 17:56:46 GMT
etag: W/"6627f65e-5df3"
server: cloudflare
cf-ray: 8798e1b9eebd569d-OSL
x-frame-options: DENY
x-content-type-options: nosniff
vary: Accept-Encoding
expires: Wed, 24 Apr 2024 22:35:46 GMT
cache-control: max-age=7200, public
content-encoding: gzip
X-Firefox-Spdy: h2
|