www.rtowebpay.com
Open in
urlscan Pro
64.237.48.68
Public Scan
Effective URL: http://www.rtowebpay.com/Account/Landing.aspx
Submission: On August 02 via api from US
Summary
This is the only time www.rtowebpay.com was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 11 | 64.237.48.68 64.237.48.68 | 20473 (AS-CHOOPA) (AS-CHOOPA) | |
3 | 2001:4de0:ac1... 2001:4de0:ac18::1:a:2b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
1 | 2a00:1450:400... 2a00:1450:4001:809::200a | 15169 (GOOGLE) (GOOGLE) | |
13 | 3 |
ASN20473 (AS-CHOOPA, US)
PTR: 64.237.48.68.constant.com
www.rtowebpay.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
rtowebpay.com
2 redirects
www.rtowebpay.com |
294 KB |
3 |
jquery.com
code.jquery.com |
153 KB |
1 |
googleapis.com
ajax.googleapis.com |
32 KB |
13 | 3 |
Domain | Requested by | |
---|---|---|
11 | www.rtowebpay.com |
2 redirects
www.rtowebpay.com
|
3 | code.jquery.com |
www.rtowebpay.com
|
1 | ajax.googleapis.com |
www.rtowebpay.com
|
13 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.jquery.com Sectigo RSA Domain Validation Secure Server CA |
2021-07-14 - 2022-08-14 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
http://www.rtowebpay.com/Account/Landing.aspx
Frame ID: 411D1D0696D4976861C985B0AEA039EF
Requests: 13 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://www.rtowebpay.com/
HTTP 302
http://www.rtowebpay.com/Account/Login.aspx?ReturnUrl=%2f&AspxAutoDetectCookieSupport=1 HTTP 302
http://www.rtowebpay.com/Account/Landing.aspx Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
- html /<input[^>]+name="__VIEWSTATE/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
ZURB Foundation (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+foundation[^>"]+css/i
- html /<div [^>]*class="[^"]*(?:small|medium|large)-\d{1,2} columns/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
- html /<input[^>]+name="__VIEWSTATE/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]([\d.]*\d)[^/]*\.js/i
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
- script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
jQuery Migrate (JavaScript Libraries) Expand
Detected patterns
- script /jquery[.-]migrate(?:-([\d.]+))?(?:\.min)?\.js(?:\?ver=([\d.]+))?/i
jQuery UI (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)\/jquery-ui(?:\.min)?\.js/i
- script /jquery-ui.*\.js/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://www.rtowebpay.com/
HTTP 302
http://www.rtowebpay.com/Account/Login.aspx?ReturnUrl=%2f&AspxAutoDetectCookieSupport=1 HTTP 302
http://www.rtowebpay.com/Account/Landing.aspx Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
13 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Landing.aspx
www.rtowebpay.com/Account/ Redirect Chain
|
6 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.4.1.js
code.jquery.com/ |
274 KB 81 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-migrate-3.0.1.js
code.jquery.com/ |
17 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-ui.min.js
code.jquery.com/ui/1.12.0/ |
247 KB 66 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.cookie.js
www.rtowebpay.com/js/vendor/ |
3 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
foundation.css
www.rtowebpay.com/css/ |
134 KB 27 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
site.css
www.rtowebpay.com/css/ |
6 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-ui.css
ajax.googleapis.com/ajax/libs/jqueryui/1.10.3/themes/redmond/ |
31 KB 32 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3top.png
www.rtowebpay.com/images/ |
109 KB 109 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3topsmall.png
www.rtowebpay.com/images/ |
18 KB 18 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sad_error.png
www.rtowebpay.com/images/ |
38 KB 38 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3side.png
www.rtowebpay.com/images/ |
91 KB 91 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
3back.png
www.rtowebpay.com/images/ |
2 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
9 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
www.rtowebpay.com/ | Name: ASP.NET_SessionId Value: 1xhwgusf3w2sioa0yerdimbg |
|
www.rtowebpay.com/ | Name: AspxAutoDetectCookieSupport Value: 1 |
5 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
ajax.googleapis.com
code.jquery.com
www.rtowebpay.com
2001:4de0:ac18::1:a:2b
2a00:1450:4001:809::200a
64.237.48.68
2c1ee3b8d4983494358bb612adf600815ab1a89d19c2fc44aa1e6e5b90681d3b
32c64cad152e53ff0729724ed460339191808ca3da405833b082d1061bfbcbac
56f9c5f99829774d0b2fbdcfd9750b617127e913afa0569afef6dfa22165659e
5a93a88493aa32aab228bf4571c01207d3b42b0002409a454d404b4d8395bd55
78613a6e5bab939b078feae691fb0661e2b2671dcce1b1be66517203b2a7b3b1
99bf2d258f852ac08b518b728acfeea390d9e4210dff910776491e82aed461d0
9c93eafe33c076d0502590b16f08e594ebec3101cc8cc31f2a1cfb8bf6b05f44
b84161c9fbf7520cd14e7019f92120bd87a928a074156e91a992eba9fc9436e8
e19b40c883c36662abb191b255da5496e2c982386c02d65a1b0364f97c445a3d
e68e9a920a4455e63274c96b73391b1fb56a71fc435a7254c6eda4097143a3b8
ef41b491008bd48b015bad5b5610bb664ddcff39efea97f43793b181e3f08ba5
fc5058137a1f2295b41cf930457808289bb162690e4eb1c1d26964819050f713
fe4b078991200c699ed3e7b89390ac7d8d4c1843c42ec4bffcf8d130989dc43a