| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/f1727eb2-68d3-46d7-bc06-9cb5b3012462 | 188.114.96.1 | 500 Internal Server Error | 4.4 kB |
URL User Request GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/f1727eb2-68d3-46d7-bc06-9cb5b3012462 IP188.114.96.1:443
CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeHTML document, ASCII text, with very long lines (394) Hash84bd8cab60ca97c9772978af79d9bd95 145a0a6634536ce03cd7b74d318852788ad3044b fb7c18dfa37fd3a906b32a48e6419eebd85627dc1abf4784eb27b10625cebbf3
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /f1727eb2-68d3-46d7-bc06-9cb5b3012462 HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,*/*;q=0.8
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
DNT: 1
Upgrade-Insecure-Requests: 1
Connection: keep-alive
Sec-Fetch-Dest: document
Sec-Fetch-Mode: navigate
Sec-Fetch-Site: cross-site
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 500 Internal Server Error
date: Wed, 24 Apr 2024 20:34:57 GMT
content-type: text/html; charset=UTF-8
content-length: 4398
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=geBAHFYgXA9TP7Bw9wLxPAuozPl1%2FslotzVDKcKG45Aq%2Fh%2F2fiMkpK9dRITNoCjdf0gRkcgWz%2F0vk6u88ot8ypFhzdvR86ceTNDE4qAorQ1Sw%2Fz%2BvZ%2F6lO1kpZczbUChgglG3UsHM330h%2FTee6%2FmNjuIWq9UjhdXgwlnZg4qwSIXMvp4"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
x-frame-options: SAMEORIGIN
referrer-policy: same-origin
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
server: cloudflare
cf-ray: 8798e0870d44568a-OSL
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/favicon.ico | 188.114.96.1 | 500 Internal Server Error | 4.4 kB |
URL GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/favicon.ico IP188.114.96.1:443
Requested byhttps://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/f1727eb2-68d3-46d7-bc06-9cb5b3012462 CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeHTML document, ASCII text, with very long lines (394) Hash9c2d7e577dc44e1345d2f586d9b1a589 fc46fdb4355d6b4186164789bb6fc041c72b9781 f162e4f8d83b2fdc25da4420b4159176c700b9d8db0a3dfe24a0f8bbabe96db2
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /favicon.ico HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: image/avif,image/webp,*/*
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/f1727eb2-68d3-46d7-bc06-9cb5b3012462
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: image
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
TE: trailers
HTTP/2 500 Internal Server Error
date: Wed, 24 Apr 2024 20:34:58 GMT
content-type: text/html; charset=UTF-8
content-length: 4398
report-to: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=EzJRgN48MH3%2BPYmIjQIU8iPRSsmEpeoss3APF7cA3S5LyIdiaUxjTacaIM7z6pbWadC1t5o8Vr%2BPHrmujd20V6fnL7Fkp%2Ffc4jnenB9x1hxP1JXZZUPzdHgr6tXMsb96auH9s%2BtOdHytxdYBf7N%2Bmj%2FSTZ7tv%2FqTARPM%2FjUzg0m6ryUX"}],"group":"cf-nel","max_age":604800}
nel: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
vary: Accept-Encoding
x-frame-options: SAMEORIGIN
referrer-policy: same-origin
cache-control: private, max-age=0, no-store, no-cache, must-revalidate, post-check=0, pre-check=0
expires: Thu, 01 Jan 1970 00:00:01 GMT
server: cloudflare
cf-ray: 8798e0889fcf568a-OSL
alt-svc: h3=":443"; ma=86400
X-Firefox-Spdy: h2
|
| cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/cdn-cgi/styles/cf.errors.css | 188.114.96.1 | 200 OK | 24 kB |
URL GET HTTP/2cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/cdn-cgi/styles/cf.errors.css IP188.114.96.1:443
Requested byhttps://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/f1727eb2-68d3-46d7-bc06-9cb5b3012462 CertificateIssuerLet's Encrypt Subjectwgwhiwgzpjw.workers.dev FingerprintB6:1A:05:18:46:DB:0E:E1:AE:D9:A2:49:F7:55:EF:07:D6:CC:8A:23 ValiditySun, 24 Mar 2024 14:12:47 GMT - Sat, 22 Jun 2024 14:12:46 GMT
File typeASCII text, with very long lines (24050) Hash5e8c69a459a691b5d1b9be442332c87d f24dd1ad7c9080575d92a9a9a2c42620725ef836 84e3c77025ace5af143972b4a40fc834dcdfd4e449d4b36a57e62326f16b3091
Analyzer | Verdict | Alert | OpenPhish | phishing | Office365 | PhishTank | phishing | Other |
GET /cdn-cgi/styles/cf.errors.css HTTP/1.1
Host: cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:96.0) Gecko/20100101 Firefox/96.0
Accept: text/css,*/*;q=0.1
Accept-Language: en-US,en;q=0.5
Accept-Encoding: gzip, deflate, br
Referer: https://cas86t798-broad-cake-e386.wgwhiwgzpjw.workers.dev/f1727eb2-68d3-46d7-bc06-9cb5b3012462
DNT: 1
Connection: keep-alive
Sec-Fetch-Dest: style
Sec-Fetch-Mode: no-cors
Sec-Fetch-Site: same-origin
Pragma: no-cache
Cache-Control: no-cache
HTTP/2 200 OK
date: Wed, 24 Apr 2024 20:34:57 GMT
content-type: text/css
last-modified: Tue, 23 Apr 2024 17:56:46 GMT
etag: W/"6627f65e-5df3"
server: cloudflare
cf-ray: 8798e0883f5d568a-OSL
x-frame-options: DENY
x-content-type-options: nosniff
vary: Accept-Encoding
expires: Wed, 24 Apr 2024 22:34:57 GMT
cache-control: max-age=7200, public
content-encoding: gzip
X-Firefox-Spdy: h2
|