Submitted URL: https://suo.yt/iEOi3nd
Effective URL: https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F...
Submission: On July 20 via manual from RO — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 3 domains to perform 1 HTTP transactions. The main IP is 2606:4700:3038::6815:e9d1, located in United States and belongs to CLOUDFLARENET, US. The main domain is sub.xeton.dev.
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on May 14th 2022. Valid for: a year.
This is the only time sub.xeton.dev was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 2606:4700:303... 13335 (CLOUDFLAR...)
1 1 2a06:98c1:312... 13335 (CLOUDFLAR...)
1 2606:4700:303... 13335 (CLOUDFLAR...)
1 1
Apex Domain
Subdomains
Transfer
1 xeton.dev
sub.xeton.dev
322 KB
1 py6.pw
subcon.py6.pw
718 B
1 suo.yt
suo.yt — Cisco Umbrella Rank: 596721
734 B
1 3
Domain Requested by
1 sub.xeton.dev
1 subcon.py6.pw 1 redirects
1 suo.yt 1 redirects
1 3

This site contains no links.

Subject Issuer Validity Valid
sni.cloudflaressl.com
Cloudflare Inc ECC CA-3
2022-05-14 -
2023-05-14
a year crt.sh

This page contains 1 frames:

Primary Page: https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.githubusercontent.com%2FACL4SSR%2FACL4SSR%2Fmaster%2FClash%2Fconfig%2FACL4SSR_Online_AdblockPlus.ini
Frame ID: 2DAD728E6328114F160637D6669D0E7E
Requests: 1 HTTP requests in this frame

Screenshot


Page URL History Show full URLs

  1. https://suo.yt/iEOi3nd HTTP 301
    https://subcon.py6.pw/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%... HTTP 301
    https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%... Page URL

Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

3
Domains

3
Subdomains

1
IPs

1
Countries

322 kB
Transfer

1932 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://suo.yt/iEOi3nd HTTP 301
    https://subcon.py6.pw/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.githubusercontent.com%2FACL4SSR%2FACL4SSR%2Fmaster%2FClash%2Fconfig%2FACL4SSR_Online_AdblockPlus.ini HTTP 301
    https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.githubusercontent.com%2FACL4SSR%2FACL4SSR%2Fmaster%2FClash%2Fconfig%2FACL4SSR_Online_AdblockPlus.ini Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request sub
sub.xeton.dev/
Redirect Chain
  • https://suo.yt/iEOi3nd
  • https://subcon.py6.pw/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.github...
  • https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.github...
2 MB
322 KB
Document
General
Full URL
https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.githubusercontent.com%2FACL4SSR%2FACL4SSR%2Fmaster%2FClash%2Fconfig%2FACL4SSR_Online_AdblockPlus.ini
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700:3038::6815:e9d1 , United States, ASN13335 (CLOUDFLARENET, US),
Reverse DNS
Software
cloudflare /
Resource Hash
890a415bfd7d62cca8c69674418171cfc8ba988eeb3e5088640806a87b0f39ac

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/103.0.5060.134 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

access-control-allow-origin
*
alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cache-control
public,max-age=60
cf-cache-status
DYNAMIC
cf-ray
72dd2ee6f946924a-FRA
content-encoding
br
content-type
text/plain;charset=utf-8
date
Wed, 20 Jul 2022 16:48:14 GMT
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
profile-update-interval
24
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=ChpmyF6Sx0SvjR%2F8Mg3inxnawvCb20Cfqq8seFLYaYJEaWBRWS6bRA9FQ4vIC0vb9a0ZSh8%2BZHARrD8Z2FZVO9AW%2Flni9C7wx5Vq0VAULfn1Z29hhH%2BWM3HaU%2B0HAzgkkubeSg6ZuN5StUKh"}],"group":"cf-nel","max_age":604800}
server
cloudflare

Redirect headers

alt-svc
h3=":443"; ma=86400, h3-29=":443"; ma=86400
cf-cache-status
DYNAMIC
cf-ray
72dd2ee51a6d5c5c-FRA
content-type
text/html
date
Wed, 20 Jul 2022 16:48:13 GMT
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
location
https://sub.xeton.dev/sub?target=clash&new_name=true&url=trojan%3A%2F%2FVJTMEKjt%40b.newword.site%3A443%7Ctrojan%3A%2F%2FeZoYEwAI%40a.newword.site%3A443&insert=false&config=https%3A%2F%2Fraw.githubusercontent.com%2FACL4SSR%2FACL4SSR%2Fmaster%2FClash%2Fconfig%2FACL4SSR_Online_AdblockPlus.ini
nel
{"success_fraction":0,"report_to":"cf-nel","max_age":604800}
report-to
{"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v3?s=yexSR81YxNUM1p%2FeSiRenTxzeW3SrC%2FSpW7iXr45VoHsS%2FxYB4Pl1Y8A9R%2BVlvJxiosjQDDLmcZ%2BbGLsVaIvEBN9wOrnoFn8bAQOwULFeIe2EYHhQBsVht05lHfKOKP6ZoQPaytnKtx7DqDM"}],"group":"cf-nel","max_age":604800}
server
cloudflare

Verdicts & Comments Add Verdict or Comment

8 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| oncontextlost object| oncontextrestored function| structuredClone object| launchQueue object| onbeforematch function| getScreenDetails function| queryLocalFonts object| navigation

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

sub.xeton.dev
subcon.py6.pw
suo.yt
2606:4700:3030::6815:4c70
2606:4700:3038::6815:e9d1
2a06:98c1:3121::3
890a415bfd7d62cca8c69674418171cfc8ba988eeb3e5088640806a87b0f39ac