eduario-login.xedule.tst.eduarte.dev
Open in
urlscan Pro
40.113.149.175
Public Scan
Effective URL: https://eduario-login.xedule.tst.eduarte.dev/?auth=eyJ4NXQjUzI1NiI6ImRmcXpUNVFTX2ZQZEc0MXpEcU1BbEQ3Y21MYVFGb2NaMVVzVk9QMHU2TXMiLCJraWQiOiJlZH...
Submission Tags: @ecarlesi possiblethreat phishing Search All
Submission: On May 19 via api from IT — Scanned from NL
Summary
TLS certificate: Issued by R3 on May 18th 2024. Valid for: 3 months.
This is the only time eduario-login.xedule.tst.eduarte.dev was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 13 | 40.113.149.175 40.113.149.175 | 8075 (MICROSOFT...) (MICROSOFT-CORP-MSN-AS-BLOCK) | |
12 | 1 |
ASN8075 (MICROSOFT-CORP-MSN-AS-BLOCK, US)
eduario-login.xedule.tst.eduarte.dev |
Apex Domain Subdomains |
Transfer | |
---|---|---|
13 |
eduarte.dev
1 redirects
eduario-login.xedule.tst.eduarte.dev |
1 MB |
12 | 1 |
Domain | Requested by | |
---|---|---|
13 | eduario-login.xedule.tst.eduarte.dev |
1 redirects
eduario-login.xedule.tst.eduarte.dev
|
12 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
eduario.xedule.tst.eduarte.dev R3 |
2024-05-18 - 2024-08-16 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://eduario-login.xedule.tst.eduarte.dev/?auth=eyJ4NXQjUzI1NiI6ImRmcXpUNVFTX2ZQZEc0MXpEcU1BbEQ3Y21MYVFGb2NaMVVzVk9QMHU2TXMiLCJraWQiOiJlZHVhcnRlaWRwLTM0ODIyNTAwOTQ2NjY5MTQyNDAiLCJhbGciOiJSUzI1NiJ9.eyJtZXRob2QiOiJwd2QiLCJhdXRoVGltZSI6IjIwMjQtMDUtMTlUMjE6MTk6MTQuODU1KzAyOjAwIiwiZXhwIjoxNzE2MTQ5OTU0LCJwYXJhbWV0ZXJzIjp7Im9yZ2FuaXNhdGlldXVpZCI6IjQwMTcxNDVBLTAxOTMtNDRBMi04NzQ3LTg3MjAyQUZCNkIxQSJ9fQ.VqsMtkygREvc2Ox5FjYrpn1UWHcTGAYO41N5Pem2UTu3pngl1p7vDGVQFyKeo7IV38_kbC3UE07J3V21xoET02bpJdCMwZpX5_5Aq3-j-No4cCbx6-wZJ4Pavbyh7pAWfNEzZaNUFV1Dh-df8J9IkhtGwUeHe-4IhCqP1IfkmGfiwtcDzdUwT9jv12XlVc0OgSPyH7UqUUIeCq05PvQ6iljecsgyuq89BSD5oi8tmXz_e_OP0tA8z6RNbBX9AdQshPDaekpJt-LlB6SJK5k4ItFiwSBIb2cdkHIU_rwsRxtp_DCS_j_O-uomsquuSHpwxxB4JdgtgfcPY1ouB-DEgA
Frame ID: F86E6A416EE29B211B2D25992B9AD559
Requests: 12 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://eduario-login.xedule.tst.eduarte.dev/?auth=eyJ4NXQjUzI1NiI6ImRmcXpUNVFTX2ZQZEc0MXpEcU1BbEQ3Y21MYVFGb2NaMVVzVk9QMH...
HTTP 302
https://eduario-login.xedule.tst.eduarte.dev/?auth=eyJ4NXQjUzI1NiI6ImRmcXpUNVFTX2ZQZEc0MXpEcU1BbEQ3Y21MYVFGb2NaMVVzVk9QMH... Page URL
Detected technologies
jQuery (JavaScript Libraries) ExpandDetected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://eduario-login.xedule.tst.eduarte.dev/?auth=eyJ4NXQjUzI1NiI6ImRmcXpUNVFTX2ZQZEc0MXpEcU1BbEQ3Y21MYVFGb2NaMVVzVk9QMHU2TXMiLCJraWQiOiJlZHVhcnRlaWRwLTM0ODIyNTAwOTQ2NjY5MTQyNDAiLCJhbGciOiJSUzI1NiJ9.eyJtZXRob2QiOiJwd2QiLCJhdXRoVGltZSI6IjIwMjQtMDUtMTlUMTk6Mzg6MzQuMzk4KzAyOjAwIiwiZXhwIjoxNzE2MTQzOTE0LCJwYXJhbWV0ZXJzIjp7Im9yZ2FuaXNhdGlldXVpZCI6IjQwMTcxNDVBLTAxOTMtNDRBMi04NzQ3LTg3MjAyQUZCNkIxQSJ9fQ.gYwFJcEduBDpp-7PoiK6UkLbuL2mYs9uYqxpsFeWZJQeD7TfOjOZr1AnAp7-j8VQilW6yEMOl6MSBhMNVhgtiBJsJdLlOjOoMJti5Tz52kaQSEDSVNX3JJu2WTPzEoA4y2B2sKCkb1bLHDcKDNKGjlb4QPW5B92rmbPEuS36WER4tOIRoCc2KXVjqqWzmNUOyEklFy6vN6YTjhauSXbiJ28EMzy7fgVdqNVuM3SjH3iPGlkWnq0TVd5d2B9kQkbFN6l1x_MiIGdjkNhsPirC-_P6B-BT_Dv_qcwNGr57JOkyV2RJwO5MG8NzvQLlF_RfdKAU-hke75NfG9rPvc7B3Q
HTTP 302
https://eduario-login.xedule.tst.eduarte.dev/?auth=eyJ4NXQjUzI1NiI6ImRmcXpUNVFTX2ZQZEc0MXpEcU1BbEQ3Y21MYVFGb2NaMVVzVk9QMHU2TXMiLCJraWQiOiJlZHVhcnRlaWRwLTM0ODIyNTAwOTQ2NjY5MTQyNDAiLCJhbGciOiJSUzI1NiJ9.eyJtZXRob2QiOiJwd2QiLCJhdXRoVGltZSI6IjIwMjQtMDUtMTlUMjE6MTk6MTQuODU1KzAyOjAwIiwiZXhwIjoxNzE2MTQ5OTU0LCJwYXJhbWV0ZXJzIjp7Im9yZ2FuaXNhdGlldXVpZCI6IjQwMTcxNDVBLTAxOTMtNDRBMi04NzQ3LTg3MjAyQUZCNkIxQSJ9fQ.VqsMtkygREvc2Ox5FjYrpn1UWHcTGAYO41N5Pem2UTu3pngl1p7vDGVQFyKeo7IV38_kbC3UE07J3V21xoET02bpJdCMwZpX5_5Aq3-j-No4cCbx6-wZJ4Pavbyh7pAWfNEzZaNUFV1Dh-df8J9IkhtGwUeHe-4IhCqP1IfkmGfiwtcDzdUwT9jv12XlVc0OgSPyH7UqUUIeCq05PvQ6iljecsgyuq89BSD5oi8tmXz_e_OP0tA8z6RNbBX9AdQshPDaekpJt-LlB6SJK5k4ItFiwSBIb2cdkHIU_rwsRxtp_DCS_j_O-uomsquuSHpwxxB4JdgtgfcPY1ouB-DEgA Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
12 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
eduario-login.xedule.tst.eduarte.dev/ Redirect Chain
|
7 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.6.0-ver-318207600000.js
eduario-login.xedule.tst.eduarte.dev/wicket/resource/org.apache.wicket.resource.JQueryResourceReference/jquery/ |
282 KB 283 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wicket-ajax-jquery-ver-318207600000.js
eduario-login.xedule.tst.eduarte.dev/wicket/resource/org.apache.wicket.ajax.AbstractDefaultAjaxBehavior/res/js/ |
71 KB 72 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
eduariofeedbackpanel-ver-1705651960000.js
eduario-login.xedule.tst.eduarte.dev/wicket/resource/nl.topicus.eduario.web.components.panel.EduArioFeedbackPanel/ |
1 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
styles-ver-1705651960000.css
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/stylesheets/ |
269 KB 270 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
signin-background-v2.jpg
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/img/ |
360 KB 361 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Inter-Regular.woff
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/fonts/ |
146 KB 147 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
flaticons-stroke.woff
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/fonts/ |
65 KB 66 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Semibold-webfont.woff
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/fonts/ |
22 KB 23 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Regular-webfont.woff
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/fonts/ |
22 KB 23 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
OpenSans-Bold-webfont.woff
eduario-login.xedule.tst.eduarte.dev/wicket/resource/assets.AssetsResourceReferenceMarker/fonts/ |
22 KB 22 KB |
Font
application/font-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
eduario-login.xedule.tst.eduarte.dev/assets/img/ |
15 KB 15 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| Wicket0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | default-src 'none'; script-src 'self' *.topicus.nl 'unsafe-inline' 'unsafe-eval'; style-src 'self' *.topicus.nl 'unsafe-inline'; img-src 'self' data: https: *; connect-src 'self'; font-src 'self'; object-src ea-osr.westeurope.cloudapp.azure.com:*; child-src 'self'; frame-ancestors 'none'; base-uri 'none'; frame-src 'self' *.topicus.nl ea-osr.westeurope.cloudapp.azure.com:* |
Strict-Transport-Security | max-age=15724800; includeSubDomains |
X-Frame-Options | DENY |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
eduario-login.xedule.tst.eduarte.dev
40.113.149.175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