URL: https://www.whatexploitsare.online/.nexus/challenge/
Submission: On January 04 via api from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 3 domains to perform 10 HTTP transactions. The main IP is 139.162.135.193, located in Frankfurt am Main, Germany and belongs to AKAMAI-LINODE-AP Akamai Connected Cloud, SG. The main domain is www.whatexploitsare.online.
TLS certificate: Issued by R3 on December 29th 2023. Valid for: 3 months.
This is the only time www.whatexploitsare.online was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
9 139.162.135.193 63949 (AKAMAI-LI...)
10 2
Domain Requested by
6 www.whatexploitsare.online www.whatexploitsare.online
1 cdn.fonts.nexus fonts.nexus
1 cf-ent-cache.nexuspipe.com www.whatexploitsare.online
1 fonts.nexus www.whatexploitsare.online
10 4

This site contains no links.

Subject Issuer Validity Valid
www.whatexploitsare.online
R3
2023-12-29 -
2024-03-28
3 months crt.sh
fonts.nexus
R3
2023-12-29 -
2024-03-28
3 months crt.sh
cf-ent-cache.nexuspipe.com
R3
2023-12-29 -
2024-03-28
3 months crt.sh
cdn.fonts.nexus
R3
2023-12-29 -
2024-03-28
3 months crt.sh

This page contains 1 frames:

Frame: https://www.whatexploitsare.online/null
Frame ID: 5580D65AD436072589D358C702C26C85
Requests: 11 HTTP requests in this frame

Screenshot


Page Statistics

10
Requests

90 %
HTTPS

0 %
IPv6

3
Domains

4
Subdomains

2
IPs

1
Countries

159 kB
Transfer

404 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

10 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
www.whatexploitsare.online/.nexus/challenge/
342 KB
106 KB
Document
General
Full URL
https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster /
Resource Hash
9cc2d9b5ca0f447c87454e3c73527a301eb5eda4b66c0c4e6f577f5b6ca2a1b5

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

cache-control
no-store, no-cache
content-encoding
gzip
content-type
text/html
date
Thu, 04 Jan 2024 16:29:40 GMT
last-modified
Thursday, 04-Jan-2024 16:29:40 GMT
nexus-node
93c776c78f2d
server
Nexuspipe.com | DDoS Mitigation Cluster
vary
Accept-Encoding
css2
fonts.nexus/
716 B
693 B
Stylesheet
General
Full URL
https://fonts.nexus/css2?family=Poppins&display=swap&local=false
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster / NexusPIPE, Fastify
Resource Hash
a51b56b7a9dd18f9371dcd9ae13758336d88144417ceb12ef8eccdbc2546f568

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.whatexploitsare.online/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36

Response headers

date
Thu, 04 Jan 2024 16:29:40 GMT
content-encoding
gzip
server
Nexuspipe.com | DDoS Mitigation Cluster
nexus-cache
BYPASS
x-powered-by
NexusPIPE, Fastify
vary
Accept-Encoding
content-type
text/css
access-control-allow-origin
*
nexus-node
93c776c78f2d
cache-control
public, max-age=86400
link
<https://cdn.fonts.nexus>; rel=preconnect; crossorigin
x-server-region
Frankfurt, DE
truncated
/
4 KB
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
b135b72fa2094242a6bb5b528a52420209020d8bd182d551d03bd5dacd9ff2c8

Request headers

accept-language
de-DE,de;q=0.9
Referer
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36

Response headers

Content-Type
image/webp
Background.svg
cf-ent-cache.nexuspipe.com/static/
7 KB
1 KB
Image
General
Full URL
https://cf-ent-cache.nexuspipe.com/static/Background.svg
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster /
Resource Hash
331c98cef3112777df85fba3dab26fbd29b89a5897324b97f98ebaeafede7de1

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.whatexploitsare.online/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36

Response headers

date
Thu, 04 Jan 2024 16:29:40 GMT
content-encoding
gzip
last-modified
Fri, 15 Sep 2023 13:42:34 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
nexus-cache
HIT
etag
W/"65045f4a-1dee"
vary
Accept-Encoding
nexus-node
93c776c78f2d
content-type
image/svg+xml
Poppins-255d561d62b2019af045055ecea1b342746a57e564b2a0c477e27807d483c0fb7c00a681ddbf06dbb0aa375d5cfa0c7d91e9a3ed1352375ca40d28b756248f5a.woff2
cdn.fonts.nexus/fonts/
50 KB
50 KB
Font
General
Full URL
https://cdn.fonts.nexus/fonts/Poppins-255d561d62b2019af045055ecea1b342746a57e564b2a0c477e27807d483c0fb7c00a681ddbf06dbb0aa375d5cfa0c7d91e9a3ed1352375ca40d28b756248f5a.woff2
Requested by
Host: fonts.nexus
URL: https://fonts.nexus/css2?family=Poppins&display=swap&local=false
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster /
Resource Hash
59c663828e08f9224c259699c9c08106143a99d32a1673746558345d14d01a91

Request headers

Referer
https://fonts.nexus/
Origin
https://www.whatexploitsare.online
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36

Response headers

date
Thu, 04 Jan 2024 16:29:40 GMT
last-modified
Fri, 24 Nov 2023 16:51:09 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
nexus-cache
HIT
etag
"6560d47d-c6e4"
access-control-allow-methods
GET, POST, OPTIONS
content-type
application/octet-stream
access-control-allow-origin
*
nexus-node
93c776c78f2d
cache-control
max-age=31536000
access-control-allow-credentials
true
accept-ranges
bytes
access-control-allow-headers
DNT,X-CustomHeader,Keep-Alive,User-Agent,X-Requested-With,If-Modified-Since,Cache-Control,Content-Type
content-length
50916
expires
Fri, 03 Jan 2025 16:23:15 GMT
ip
www.whatexploitsare.online/.nexus/
15 B
191 B
Fetch
General
Full URL
https://www.whatexploitsare.online/.nexus/ip
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster /
Resource Hash
4c970ecca070f3feb6693bb26bf95bf65319a17e8e537d3f922c4f03a399130c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.whatexploitsare.online/.nexus/challenge/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36

Response headers

content-type
text/plain
date
Thu, 04 Jan 2024 16:29:40 GMT
cache-control
no-store, no-cache
last-modified
Thursday, 04-Jan-2024 16:29:40 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
content-length
15
nexus-node
93c776c78f2d
interact
www.whatexploitsare.online/.nexus/
604 B
798 B
Fetch
General
Full URL
https://www.whatexploitsare.online/.nexus/interact
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster / Express
Resource Hash
58469e0c8325f825f613404063b74a9bef6ae7c9b204a5d18a6dc35053c4f58d

Request headers

Referer
https://www.whatexploitsare.online/.nexus/challenge/?
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36
Content-Type
application/json

Response headers

date
Thu, 04 Jan 2024 16:29:40 GMT
content-encoding
gzip
last-modified
Thursday, 04-Jan-2024 16:29:40 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
x-powered-by
Express
etag
W/"25c-j4mQJJ3CUrLoo7aiLeKJZhgHim8"
vary
Accept-Encoding
nexus-node
93c776c78f2d
content-type
application/json; charset=utf-8
cache-control
no-store, no-cache
ip
www.whatexploitsare.online/.nexus/
15 B
191 B
Fetch
General
Full URL
https://www.whatexploitsare.online/.nexus/ip
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster /
Resource Hash
4c970ecca070f3feb6693bb26bf95bf65319a17e8e537d3f922c4f03a399130c

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://www.whatexploitsare.online/.nexus/challenge/?
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36

Response headers

content-type
text/plain
date
Thu, 04 Jan 2024 16:29:40 GMT
cache-control
no-store, no-cache
last-modified
Thursday, 04-Jan-2024 16:29:40 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
content-length
15
nexus-node
93c776c78f2d
eea255a69cde14e9a58ea89e9112c93f80daa2663d31c0bfdac5c2fca16c2da0
www.whatexploitsare.online/.nexus/interact/
2 B
0
Fetch
General
Full URL
https://www.whatexploitsare.online/.nexus/interact/eea255a69cde14e9a58ea89e9112c93f80daa2663d31c0bfdac5c2fca16c2da0
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster / Express
Resource Hash

Request headers

Referer
https://www.whatexploitsare.online/.nexus/challenge/?
Payload
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
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36
Content-Type
application/json

Response headers

date
Thu, 04 Jan 2024 16:29:41 GMT
last-modified
Thursday, 04-Jan-2024 16:29:41 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
x-powered-by
Express
etag
W/"2-nOO9QiTIwXgNtWtBJezz8kv3SLc"
nexus-node
93c776c78f2d
content-type
text/plain; charset=utf-8
cache-control
no-store, no-cache
content-length
2
request_connector
www.whatexploitsare.online/.nexus/
3 B
0
Fetch
General
Full URL
https://www.whatexploitsare.online/.nexus/request_connector
Requested by
Host: www.whatexploitsare.online
URL: https://www.whatexploitsare.online/.nexus/challenge/?
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
139.162.135.193 Frankfurt am Main, Germany, ASN63949 (AKAMAI-LINODE-AP Akamai Connected Cloud, SG),
Reverse DNS
139-162-135-193.akamai-compute.nexuspipe.com
Software
Nexuspipe.com | DDoS Mitigation Cluster /
Resource Hash

Request headers

Referer
https://www.whatexploitsare.online/.nexus/challenge/?
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.6099.129 Safari/537.36
Token
eea255a69cde14e9a58ea89e9112c93f80daa2663d31c0bfdac5c2fca16c2da0

Response headers

date
Thu, 04 Jan 2024 16:29:41 GMT
content-encoding
gzip
last-modified
Thursday, 04-Jan-2024 16:29:41 GMT
server
Nexuspipe.com | DDoS Mitigation Cluster
vary
Accept-Encoding
nexus-node
93c776c78f2d
content-type
text/plain
cache-control
no-store, no-cache
null
www.whatexploitsare.online/
0
0

Failed requests

These URLs were requested, but there was no response received. You will also see them in the list above.

Domain
www.whatexploitsare.online
URL
https://www.whatexploitsare.online/null

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

1 Cookies

Domain/Path Name / Value
www.whatexploitsare.online/ Name: .pipe
Value: eyJ0eXAiOiJKV1QiLCJhbGciOiJIUzI1NiJ9.eyJpc3N1ZWQiOjE3MDQzODU3ODEuMTg0LCJrZXkiOiJpaHRGSDhUcWtWQ0hFY3pjdW8xMkUwWFo1NXpudGRLeENcL2c2NHBxZ3UwUT0iLCJlIjoxNzA0Mzg5MzgxLCJzYWx0IjoibmFjbCIsImNvbm5lY3RvciI6LTF9.Yog92XwFuMyRnAU6kzJdD2BcdT7RznyKKNS7imMfmgw