![](/screenshots/018af067-06f5-4bec-9009-5c19f7071255.png)
w4e3dm.gql67i.com
Open in
urlscan Pro
2a06:98c1:3120::3
Public Scan
Effective URL: https://w4e3dm.gql67i.com/w4e3dM/
Submission: On May 09 via manual from US — Scanned from DE
Summary
TLS certificate: Issued by E1 on May 2nd 2024. Valid for: 3 months.
This is the only time w4e3dm.gql67i.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 167.89.118.52 167.89.118.52 | 11377 (SENDGRID) (SENDGRID) | |
1 1 | 172.67.196.232 172.67.196.232 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a06:98c1:312... 2a06:98c1:3120::3 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a04:4e42::649 2a04:4e42::649 | 54113 (FASTLY) (FASTLY) | |
1 2 | 104.17.2.184 104.17.2.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 104.17.3.184 104.17.3.184 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 4 |
ASN11377 (SENDGRID, US)
PTR: o16789118x52.outbound-mail.sendgrid.net
url5932.luisgarciagroup.com |
ASN13335 (CLOUDFLARENET, US)
worker-damp-king-9819.againstspam9847848787457845.workers.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
cloudflare.com
1 redirects
challenges.cloudflare.com — Cisco Umbrella Rank: 4500 |
14 KB |
1 |
jquery.com
code.jquery.com — Cisco Umbrella Rank: 776 |
30 KB |
1 |
gql67i.com
w4e3dm.gql67i.com |
4 KB |
1 |
workers.dev
1 redirects
worker-damp-king-9819.againstspam9847848787457845.workers.dev |
507 B |
1 |
luisgarciagroup.com
1 redirects
url5932.luisgarciagroup.com |
304 B |
4 | 5 |
Domain | Requested by | |
---|---|---|
3 | challenges.cloudflare.com |
1 redirects
w4e3dm.gql67i.com
challenges.cloudflare.com |
1 | code.jquery.com |
w4e3dm.gql67i.com
|
1 | w4e3dm.gql67i.com | |
1 | worker-damp-king-9819.againstspam9847848787457845.workers.dev | 1 redirects |
1 | url5932.luisgarciagroup.com | 1 redirects |
4 | 5 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
gql67i.com E1 |
2024-05-02 - 2024-07-31 |
3 months | crt.sh |
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2023-07-11 - 2024-07-14 |
a year | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 2 frames:
Primary Page:
https://w4e3dm.gql67i.com/w4e3dM/
Frame ID: 12B08AFC2153CAD71862400F7D0FBD32
Requests: 3 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/reqw7/0x4AAAAAAAZsDhX4wMlFbcHO/auto/normal
Frame ID: 2F40821909D4550EFBE896152A096E64
Requests: 1 HTTP requests in this frame
Screenshot
![](/screenshots/018af067-06f5-4bec-9009-5c19f7071255.png)
Page Title
CFuKoRESNePage URL History Show full URLs
-
http://url5932.luisgarciagroup.com/ls/click?upn=u001.HLV-2FOEAaw6Jhhb1tRBjpFC5-2FnN4NIvSa2SK5NM5bQNfA6TLr-2B0BA...
HTTP 307
https://url5932.luisgarciagroup.com/ls/click?upn=u001.HLV-2FOEAaw6Jhhb1tRBjpFC5-2FnN4NIvSa2SK5NM5bQNfA6TLr-2B0BA... HTTP 302
https://worker-damp-king-9819.againstspam9847848787457845.workers.dev/?eba=palestra@mufgamericas.com HTTP 302
https://w4e3dm.gql67i.com/w4e3dM/ Page URL
Detected technologies
![](/vendor/wappa/icons/Laravel.png)
Detected patterns
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://url5932.luisgarciagroup.com/ls/click?upn=u001.HLV-2FOEAaw6Jhhb1tRBjpFC5-2FnN4NIvSa2SK5NM5bQNfA6TLr-2B0BA-2Bs6AnHd03SVQP5slb09loTTUCTLc31OCsMrA80mpz94vjbHVnOnFbppH6Vd9s9NzI8hu8lQREI6XZW4GHBqf7RrUuurzkUSRGQ-3D-3DUGKu_eRB-2Fd1f0qQDFEPVXhSeSHzpZP1Q-2B9JKySeKvs4AJlVYFnOkSYuahDDhLxt6Rmr84xBVDU5F1svUZTfU60Nvvst3h-2F-2Bd0SAFtFK17jw79uCejsLWLZSrN4uwzt-2FxtQucNGHMIIGU48fL7nRfWPy4WtGG498Bkb2KV-2BOt9vOPCtnMdOl-2BNsuKN5eAl3l4-2BkQrCRGZYiTC8K7B0zToltB32e7ZskDuNcBdqlUWTEeoqZt0-3D
HTTP 307
https://url5932.luisgarciagroup.com/ls/click?upn=u001.HLV-2FOEAaw6Jhhb1tRBjpFC5-2FnN4NIvSa2SK5NM5bQNfA6TLr-2B0BA-2Bs6AnHd03SVQP5slb09loTTUCTLc31OCsMrA80mpz94vjbHVnOnFbppH6Vd9s9NzI8hu8lQREI6XZW4GHBqf7RrUuurzkUSRGQ-3D-3DUGKu_eRB-2Fd1f0qQDFEPVXhSeSHzpZP1Q-2B9JKySeKvs4AJlVYFnOkSYuahDDhLxt6Rmr84xBVDU5F1svUZTfU60Nvvst3h-2F-2Bd0SAFtFK17jw79uCejsLWLZSrN4uwzt-2FxtQucNGHMIIGU48fL7nRfWPy4WtGG498Bkb2KV-2BOt9vOPCtnMdOl-2BNsuKN5eAl3l4-2BkQrCRGZYiTC8K7B0zToltB32e7ZskDuNcBdqlUWTEeoqZt0-3D HTTP 302
https://worker-damp-king-9819.againstspam9847848787457845.workers.dev/?eba=palestra@mufgamericas.com HTTP 302
https://w4e3dm.gql67i.com/w4e3dM/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 1- https://challenges.cloudflare.com/turnstile/v0/api.js?render=explicit HTTP 302
- https://challenges.cloudflare.com/turnstile/v0/b/ce7818f50e39/api.js
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
w4e3dm.gql67i.com/w4e3dM/ Redirect Chain
|
6 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0.min.js
code.jquery.com/ |
87 KB 30 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
api.js
challenges.cloudflare.com/turnstile/v0/b/ce7818f50e39/ Redirect Chain
|
42 KB 14 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
normal
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/b/turnstile/if/ov2/av0/rcv0/0/reqw7/0x4AAAAAAAZsDhX4wMlFbcHO/auto/ Frame 2F40 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 function| $ function| jQuery object| turnstile function| DugnCkuauE function| ZovOlxxpTv2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
w4e3dm.gql67i.com/ | Name: XSRF-TOKEN Value: eyJpdiI6IkVCWElMQ3NSUHFQbWxoS1MrcmFoQlE9PSIsInZhbHVlIjoicnZXOCtqeG1HdjlqalJ4QkdSdGROZVp0S1ppV1h6QmJoQ0tTYWpmTVpIQ25iV2xBRGtnOXBKMzVIaWJTRlhHQTY2cklwYUQ4N3NULzB0NHd5SzUxbmdoaW1IWGdlVGczYjIrbWU1SVdUL09NWW9GMk5vMkRzWE5ZSVAraDRzOVMiLCJtYWMiOiIyZWY2M2I3NDcyNjVmMmI4NzRiZDBkM2ViYWZlYThmZjI3MzBkOGM1ZjlhNjk3NmFhZGRhYzgzOTFlMWM2OWZhIiwidGFnIjoiIn0%3D |
|
w4e3dm.gql67i.com/ | Name: laravel_session Value: eyJpdiI6IlM0VnlHR01LalFTYy9rdnZoWXlpMmc9PSIsInZhbHVlIjoiR3kzcDRCQitCM3ovbGswejROWEhrdUw5eEcxS3BaQVpGd1hxRHZ6d1lFZTlqTFdWb0ZpUHIzejl1OVlFcVNSa0w0RHR5NzJMSndQZXRsUTF3ZzhMNzhHODk3T1JSTEU1S3ovQW1LZUZlM1NwMG5zVXJpUmxhcmxlV0hvWVRJcXgiLCJtYWMiOiJlNWRjMmM0NWU1YzFkZjk4YjczYzcwNGExNWZmNWQ0MGU3NDFjYTcyNzhiZWIyNzNlY2MwNDllYjQ1OWVlY2M0IiwidGFnIjoiIn0%3D |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
code.jquery.com
url5932.luisgarciagroup.com
w4e3dm.gql67i.com
worker-damp-king-9819.againstspam9847848787457845.workers.dev
104.17.2.184
104.17.3.184
167.89.118.52
172.67.196.232
2a04:4e42::649
2a06:98c1:3120::3
49a5abedf03eb8ad9a66eca7c5ccb8e59a440e06958e1e7b71d078f494178dc5
89cfccfaf8df9e41bb856176e58b2963f5bebf2b2140f9ab2193782e46d8c6d0
ff1523fb7389539c84c65aba19260648793bb4f5e29329d2ee8804bc37a3fe6e