![](/screenshots/ef2da1ea-2119-432c-ab3d-a258af3ddee6.png)
www.izoologic.com
Open in
urlscan Pro
2606:4700:20::681a:64b
Public Scan
Submission: On August 24 via api from US — Scanned from US
Summary
TLS certificate: Issued by GTS CA 1P5 on July 29th 2023. Valid for: 3 months.
This is the only time www.izoologic.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 2606:4700:20:... 2606:4700:20::681a:64b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 2606:4700::68... 2606:4700::6811:2b8 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
14 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
izoologic.com
www.izoologic.com |
168 KB |
4 |
cloudflare.com
challenges.cloudflare.com — Cisco Umbrella Rank: 6115 |
20 KB |
14 | 2 |
Domain | Requested by | |
---|---|---|
8 | www.izoologic.com |
www.izoologic.com
|
4 | challenges.cloudflare.com |
www.izoologic.com
challenges.cloudflare.com |
14 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
izoologic.com GTS CA 1P5 |
2023-07-29 - 2023-10-27 |
3 months | crt.sh |
challenges.cloudflare.com Cloudflare Inc ECC CA-3 |
2023-08-18 - 2024-08-17 |
a year | crt.sh |
This page contains 3 frames:
Primary Page:
https://www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-trickbot/
Frame ID: 0D6D68D82158769560EF3681B1648384
Requests: 14 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/nwbth/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
Frame ID: B61624A0F36E2651357BD3A556EE00AD
Requests: 1 HTTP requests in this frame
Frame:
https://challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/dthet/0x4AAAAAAADnPIDROrmt1Wwj/light/normal
Frame ID: 9154482A6B28C5C653F537FE95ED1519
Requests: 1 HTTP requests in this frame
Screenshot
![](/screenshots/ef2da1ea-2119-432c-ab3d-a258af3ddee6.png)
Page Title
iZOOlogicPage URL History Show full URLs
- https://www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-tric... Page URL
- https://www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-tric... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-trickbot/ Page URL
- https://www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-trickbot/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
14 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-trickbot/ |
28 KB 21 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v1
www.izoologic.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/ |
158 KB 53 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
challenges.cloudflare.com/turnstile/v0/g/313d8a27/ |
29 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
e7cb5c0b-8c52-49ff-9670-8d1bb59fd57b
https://www.izoologic.com/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
670b5023fe6ff3f
www.izoologic.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1138399891:1692853732:KrgZ_rEm5LMuU-vypFZnxS6oz8rgI3ppPuAPDFxzliI/7fb968231a444bd5/ |
9 KB 8 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
normal
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/nwbth/0x4AAAAAAADnPIDROrmt1Wwj/light/ Frame B616 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
670b5023fe6ff3f
www.izoologic.com/cdn-cgi/challenge-platform/h/g/flow/ov1/1138399891:1692853732:KrgZ_rEm5LMuU-vypFZnxS6oz8rgI3ppPuAPDFxzliI/7fb968231a444bd5/ |
2 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
www.izoologic.com/2021/12/14/conti-ransomware-deployed-for-phishing-attacks-by-shatak-and-trickbot/ |
28 KB 20 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
15 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
v1
www.izoologic.com/cdn-cgi/challenge-platform/h/g/orchestrate/chl_page/ |
160 KB 54 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
api.js
challenges.cloudflare.com/turnstile/v0/g/313d8a27/ |
29 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET BLOB |
b2c36c75-88a7-4a8e-a0b1-c74b18cc6e7e
https://www.izoologic.com/ |
13 B 0 |
Other
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
4a36e454d92d4da
www.izoologic.com/cdn-cgi/challenge-platform/h/g/flow/ov1/912443119:1692853745:-Ahelr3KtVWI3aPsgdniWVVC8l6q-nFi_rQBMBY_CZU/7fb96836ab184bd5/ |
9 KB 7 KB |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
normal
challenges.cloudflare.com/cdn-cgi/challenge-platform/h/g/turnstile/if/ov2/av0/rcv0/0/dthet/0x4AAAAAAADnPIDROrmt1Wwj/light/ Frame 9154 |
0 0 |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
4a36e454d92d4da
www.izoologic.com/cdn-cgi/challenge-platform/h/g/flow/ov1/912443119:1692853745:-Ahelr3KtVWI3aPsgdniWVVC8l6q-nFi_rQBMBY_CZU/7fb96836ab184bd5/ |
2 KB 2 KB |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
16 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 object| documentPictureInPicture object| _cf_chl_opt function| URXdVe4 boolean| KdU6 function| vQGSCb7 function| TwZwupsVWD function| QlFv6 function| ICY6 function| ozlfeI1 function| aw3 object| Rkiqk9 object| YSIJaU7 object| turnstile boolean| HVYp3 string| qja62 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.izoologic.com/ | Name: cf_chl_rc_m Value: 1 |
|
www.izoologic.com/ | Name: cf_chl_2 Value: 4a36e454d92d4da |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
challenges.cloudflare.com
www.izoologic.com
2606:4700:20::681a:64b
2606:4700::6811:2b8
06fd6661fe8952eb9a392607a2fb7e37acde129e09c2f940a6cdda7b66188374
0b459ea8543aa2e95cc9670f5862c14a5f1a1ba83016c9adb2b0779fd224efc8
0ee4598f7cc108e2589f1fc37069cd07e140a8adc29e28dd3eaf03d5d15e8539
1acd51189ff983fda74a6bc43806de76ab114cb98de1662dcb135af339c5a0e3
1ae488283b6cebf52b5bd97cd3dbe44e84ab7e87234525258a07e59a1904c2ed
75a89f7e37b45bf9e451c2223d154a47f8deecafdee6e1af3c3ac428451da4d0
7cd072c23e071faf6210af04965c6f94e83bcf7992049c8bc1a9cff3a4052330
8860e7fef89219a219cb11d18bd8e4a322f32072613f86e935e7fe162ab69c04
92bfa4716c0a726c8f18ccac25aa102f321e73e02c2571b8d838609cdb2a7f68
ab30bae2a899d6018cc4da8d3c8351cec495b5eac565295510fc82bd4a06fa04
c36db2df80259b20c44618a6b20635cb16e69b8ac03c4bd73309a2c90917b366