![](/screenshots/61e8e561-0e0e-4851-b4cf-87654b3b4d7c.png)
aptisal.cfd
Open in
urlscan Pro
172.67.158.103
Public Scan
Effective URL: https://aptisal.cfd/
Submission Tags: 0xscam
Submission: On April 04 via api from US — Scanned from DE
Summary
TLS certificate: Issued by E1 on April 4th 2024. Valid for: 3 months.
This is the only time aptisal.cfd was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 5 | 172.67.158.103 172.67.158.103 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
5 |
aptisal.cfd
1 redirects
aptisal.cfd |
7 KB |
4 | 1 |
Domain | Requested by | |
---|---|---|
5 | aptisal.cfd |
1 redirects
aptisal.cfd
|
4 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
aptisal.cfd E1 |
2024-04-04 - 2024-07-03 |
3 months | crt.sh |
This page contains 2 frames:
Primary Page:
https://aptisal.cfd/
Frame ID: EFF354AEA8C3F75082985D4F6FFBC375
Requests: 2 HTTP requests in this frame
Frame:
https://aptisal.cfd/cdn-cgi/challenge-platform/h/b/scripts/jsd/bcc5fb0a8815/main.js
Frame ID: 79720B7D24B86F12BDCA6BBA54E001A3
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://aptisal.cfd/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://aptisal.cfd/cdn-cgi/challenge-platform/h/b/scripts/jsd/bcc5fb0a8815/main.js
4 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
aptisal.cfd/ |
1 KB 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
main.js
aptisal.cfd/cdn-cgi/challenge-platform/h/b/scripts/jsd/bcc5fb0a8815/ Frame 7972 Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
aptisal.cfd/ |
139 B 551 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H3 |
86f23b2118f59f30
aptisal.cfd/cdn-cgi/challenge-platform/h/b/jsd/r/ Frame 7972 |
0 580 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
1 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 01 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.aptisal.cfd/ | Name: cf_clearance Value: UlpApZsicYy0ZkWH4ysoxFRzF9eLe3DxUBRNpHy7G_Y-1712243487-1.0.1.1-9vN.nj2wqz7dZup_FM16KBlIUliwKzjXl1a3EoD7mxB2nrNLRJuG2FenmSq.OLy.KB_Cu_2mQx.D1SANbQ73BA |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
aptisal.cfd
172.67.158.103
30dbd7b5e633819b6e4610d1b2b1307c613621adf423dbf5437e95de95d3aa17
7aad21e401e275d4b26e78b7e7de9dd630aaa34f01927dce3308333b0f76fafe
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
f85cda64f50b5fc63f159bc163bdc52f5329471baa7b9007d412407562152073