GET u6re.dezceccc.ru/cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response=
104.21.112.1400 Bad Request 23 B URL User Request GET u6re.dezceccc.ru/cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response=
IP 104.21.112.1:443
Certificate IssuerGoogle Trust Services
Subjectdezceccc.ru
FingerprintCA:D4:9C:D1:9C:F0:D3:E3:9D:33:E1:22:39:9D:1C:F1:D1:EC:F9:7C
ValidityMon, 02 Jun 2025 13:24:04 GMT - Sun, 31 Aug 2025 14:21:39 GMT
File type ASCII text, with no line terminators
Hash 1862a245f1f02bd4477a17e9432e3a25
5e9e7ba669c7c6e7aa7aede335b0b22f0a08b88f
e999e13afc2c76a9b3523daa037814a97f9ad5310ee32c4dfe3b5d006a0ed73b
Analyzer Verdict Alert Quad9 DNS malicious Sinkholed
GET /cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response= HTTP/1.1
Host: u6re.dezceccc.ru
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 400 Bad Request
date: Wed, 18 Jun 2025 12:00:47 GMT
vary: accept-encoding
report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=GZBIJFviksdGaizmcOyHoaESfK72pRgYDNJgPOApiNRggc7d1Gbb50rVfbFnlf3TWOdCGpNcspd05jHZ3JG7KjV0YR97ZJ4nblGGd8qa"}]}
nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
server: cloudflare
cf-ray: 951aa0db0f6d1bfe-OSL
X-Firefox-Spdy: h2
GET u6re.dezceccc.ru/cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response=
104.21.32.1403 Forbidden 151 B URL User Request GET u6re.dezceccc.ru/cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response=
IP 104.21.32.1:80
File type HTML document, ASCII text, with CRLF line terminators
Hash c371fa8374a06a3c0535fc341d454236
441671eacb9398792d435443beaddd3fc5fa1910
eed0b81a2fbdd1c5a9f80705885fc5bbf346ba428a79ff7a13ec8491c6a8e96c
Analyzer Verdict Alert Quad9 DNS malicious Sinkholed
GET /cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response= HTTP/1.1
Host: u6re.dezceccc.ru
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Upgrade-Insecure-Requests: 1
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 403 Forbidden
Date: Wed, 18 Jun 2025 12:00:48 GMT
Content-Type: text/html
Transfer-Encoding: chunked
Connection: keep-alive
Server: cloudflare
CF-RAY: 951aa0dbfc9c56c4-OSL
X-Frame-Options: DENY
X-Content-Type-Options: nosniff
Content-Encoding: gzip
GET u6re.dezceccc.ru/favicon.ico
104.21.32.1404 Not Found 0 B URL GET u6re.dezceccc.ru/favicon.ico
IP 104.21.32.1:80
Requested by http://u6re.dezceccc.ru/cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response=
Hash d41d8cd98f00b204e9800998ecf8427e
da39a3ee5e6b4b0d3255bfef95601890afd80709
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Analyzer Verdict Alert Quad9 DNS malicious Sinkholed
GET /favicon.ico HTTP/1.1
Host: u6re.dezceccc.ru
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate
DNT: 1
Connection: keep-alive
Referer: http://u6re.dezceccc.ru/cdn-cgi/phish-bypass?atok=dsQxcZEvxEmx.DDdtKTWtUqZfkApcpJhGbGBqp1g2Po-1750228345.8215659-0.0.1.1-%2F%7Bldat%21voguciearvyb%2F&original_path=%2Fzldat%21voguciearvyb%2F&cf-turnstile-response=
Pragma: no-cache
Cache-Control: no-cache
HTTP/1.1 404 Not Found
Date: Wed, 18 Jun 2025 12:00:48 GMT
Content-Type: text/html; charset=UTF-8
Transfer-Encoding: chunked
Connection: keep-alive
Nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
Report-To: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=PmY%2B95szOpk2SLWrQUQUYh%2BSOFYdjbmLxtq3xfzkxWYSwvBzHqLd%2FVY5msBQ4GMxgkJYjSX4X%2Bv%2FTkknDFhbF2ec4K5d5cJs3xY%3D"}]}
cf-cache-status: MISS
Vary: accept-encoding
Cache-Control: max-age=14400
Server: cloudflare
CF-RAY: 951aa0dd4e5a56c4-OSL
Content-Encoding: gzip
alt-svc: h2=":443"; ma=60
server-timing: cfL4;desc="?proto=TCP&rtt=455&min_rtt=407&rtt_var=149&sent=4&recv=6&lost=0&retrans=0&sent_bytes=395&recv_bytes=1112&delivery_rate=6148619&cwnd=251&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"