0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io Open in urlscan Pro
159.69.130.178  Public Scan

Submitted URL: http://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Effective URL: https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Submission: On January 10 via api from US — Scanned from DE

Summary

This website contacted 2 IPs in 1 countries across 2 domains to perform 2 HTTP transactions. The main IP is 159.69.130.178, located in Hobstin, Germany and belongs to HETZNER-AS, DE. The main domain is 0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io.
TLS certificate: Issued by R3 on January 3rd 2022. Valid for: 3 months.
This is the only time 0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 159.69.130.178 24940 (HETZNER-AS)
1 2a05:d014:275... 16509 (AMAZON-02)
2 2
Domain Requested by
2 0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io 1 redirects
1 oops.prescreen.io 0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io
2 2

This site contains links to these domains. Also see Links.

Domain
prescreen.io
Subject Issuer Validity Valid
prescreenapp.io
R3
2022-01-03 -
2022-04-03
3 months crt.sh
oops.prescreen.io
R3
2021-11-30 -
2022-02-28
3 months crt.sh

This page contains 1 frames:

Primary Page: https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Frame ID: F7AD3B75C1570BF3EE7E65F4CC9FA71D
Requests: 2 HTTP requests in this frame

Screenshot

Page Title

Nothing to be found here

Page URL History Show full URLs

  1. http://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/ HTTP 302
    https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/ Page URL

Page Statistics

2
Requests

50 %
HTTPS

50 %
IPv6

2
Domains

2
Subdomains

2
IPs

1
Countries

109 kB
Transfer

109 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/ HTTP 302
    https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Redirect Chain
  • http://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
  • https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
1 KB
1 KB
Document
General
Full URL
https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
159.69.130.178 Hobstin, Germany, ASN24940 (HETZNER-AS, DE),
Reverse DNS
lb.prescreen.io
Software
/
Resource Hash
f8c493febf65ba61e25dd1ff41a176aff9e23712483d9525905fbcc96a067e63

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

cache-control
no-cache
content-type
text/html

Redirect headers

Cache-Control
no-cache
Content-length
0
Location
https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
404.png
oops.prescreen.io/
108 KB
108 KB
Image
General
Full URL
https://oops.prescreen.io/404.png
Requested by
Host: 0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io
URL: https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Protocol
H2
Security
TLS 1.3, , AES_256_GCM
Server
2a05:d014:275:cb02:7bc2:ee46:f4f6:be94 Frankfurt am Main, Germany, ASN16509 (AMAZON-02, US),
Reverse DNS
Software
Netlify /
Resource Hash
39724eaf83192a9f15c90ed738da1731c356d1adb6e42a9b2187fc2fab9952f8
Security Headers
Name Value
Strict-Transport-Security max-age=31536000

Request headers

Accept-Language
de-DE,de;q=0.9
Referer
https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/97.0.4692.71 Safari/537.36

Response headers

x-nf-request-id
01FS1G9BCJA856DS08DF6B7ERV
date
Mon, 10 Jan 2022 08:04:47 GMT
server
Netlify
age
0
etag
"0e4adecb6f4564de7b3c71bf087ec344-ssl"
strict-transport-security
max-age=31536000
content-type
image/png
cache-control
public, max-age=0, must-revalidate
accept-ranges
bytes
content-length
110394

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onsecuritypolicyviolation object| onslotchange

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io/
Message:
Failed to load resource: the server responded with a status of 404 ()

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

0-boot-security-saml-demo-oktabreakthrough.hacker.jobbase.io
oops.prescreen.io
159.69.130.178
2a05:d014:275:cb02:7bc2:ee46:f4f6:be94
39724eaf83192a9f15c90ed738da1731c356d1adb6e42a9b2187fc2fab9952f8
f8c493febf65ba61e25dd1ff41a176aff9e23712483d9525905fbcc96a067e63