mock.hackme.secops.group
Open in
urlscan Pro
16.16.224.188
Public Scan
Effective URL: https://mock.hackme.secops.group/
Submission: On April 24 via manual from TR — Scanned from SE
Summary
TLS certificate: Issued by R3 on April 22nd 2024. Valid for: 3 months.
This is the only time mock.hackme.secops.group was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
9 | 16.16.224.188 16.16.224.188 | 16509 (AMAZON-02) (AMAZON-02) | |
2 | 104.18.10.207 104.18.10.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
11 | 2 |
ASN16509 (AMAZON-02, US)
PTR: ec2-16-16-224-188.eu-north-1.compute.amazonaws.com
mock.hackme.secops.group |
Apex Domain Subdomains |
Transfer | |
---|---|---|
9 |
secops.group
mock.hackme.secops.group |
115 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1139 |
39 KB |
11 | 2 |
Domain | Requested by | |
---|---|---|
9 | mock.hackme.secops.group |
mock.hackme.secops.group
|
2 | maxcdn.bootstrapcdn.com |
mock.hackme.secops.group
maxcdn.bootstrapcdn.com |
11 | 2 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
mock.hackme.secops.group R3 |
2024-04-22 - 2024-07-21 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-03-27 - 2024-06-25 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://mock.hackme.secops.group/
Frame ID: BA5BBEF7C9CC4229A3E9D7B72C80AF1C
Requests: 11 HTTP requests in this frame
Screenshot
Page Title
The SecOps GroupPage URL History Show full URLs
-
http://mock.hackme.secops.group/
HTTP 307
https://mock.hackme.secops.group/ Page URL
Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Slick (JavaScript Libraries) Expand
Detected patterns
- (?:/([\d.]+))?/slick(?:\.min)?\.js
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://mock.hackme.secops.group/
HTTP 307
https://mock.hackme.secops.group/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
11 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
mock.hackme.secops.group/ Redirect Chain
|
8 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
mock.hackme.secops.group/public/js/ |
94 KB 33 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.mininoty.min.js
mock.hackme.secops.group/public/js/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
mock.hackme.secops.group/public/js/ |
59 KB 16 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
slick.js
mock.hackme.secops.group/public/js/ |
87 KB 15 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
style.css
mock.hackme.secops.group/public/css/ |
1 KB 896 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
mock.hackme.secops.group/public/common_img/ |
45 KB 45 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
custom.js
mock.hackme.secops.group/ |
15 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
glyphicons-halflings-regular.woff2
maxcdn.bootstrapcdn.com/bootstrap/3.3.6/fonts/ |
18 KB 18 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
mock.hackme.secops.group/public/common_img/ |
45 KB 0 |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
function| $ function| jQuery object| bootstrap object| jQuery111005768992745863757 function| fn_error_msg function| fn_success_msg1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
mock.hackme.secops.group/ | Name: PHPSESSID Value: la57e89ervv8d5m3bdq1hdo1i2 |
4 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
maxcdn.bootstrapcdn.com
mock.hackme.secops.group
104.18.10.207
16.16.224.188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