URL: https://img.teleflora.com/image/upload/q_100,f_auto/v1586472347/bluecore/T15F100C_ENV
Submission: On May 22 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2a04:4e42:3::513, located in Ascension Island and belongs to FASTLY, US. The main domain is img.teleflora.com.
TLS certificate: Issued by GlobalSign CloudSSL CA - SHA256 - G3 on May 22nd 2020. Valid for: a year.
This is the only time img.teleflora.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2a04:4e42:3::513 54113 (FASTLY)
1 1
Apex Domain
Subdomains
Transfer
1 teleflora.com
img.teleflora.com
152 KB
1 1
Domain Requested by
1 img.teleflora.com
1 1

This site contains no links.

Subject Issuer Validity Valid
cloudinary-pin-sni.map.fastly.net
GlobalSign CloudSSL CA - SHA256 - G3
2020-05-22 -
2021-04-25
a year crt.sh

This page contains 1 frames:

Primary Page: https://img.teleflora.com/image/upload/q_100,f_auto/v1586472347/bluecore/T15F100C_ENV
Frame ID: 6B8C4A6A838C10FD5586132CA1FAF1C5
Requests: 1 HTTP requests in this frame

Screenshot


Page Statistics

1
Requests

100 %
HTTPS

100 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

152 kB
Transfer

152 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request T15F100C_ENV
img.teleflora.com/image/upload/q_100,f_auto/v1586472347/bluecore/
152 KB
152 KB
Document
General
Full URL
https://img.teleflora.com/image/upload/q_100,f_auto/v1586472347/bluecore/T15F100C_ENV
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, CHACHA20_POLY1305
Server
2a04:4e42:3::513 , Ascension Island, ASN54113 (FASTLY, US),
Reverse DNS
Software
Cloudinary /
Resource Hash
48b49be94d6102ee8ac17479132a4dc9c13b1138e796b3fdde77c2db8ff8241c
Security Headers
Name Value
Strict-Transport-Security max-age=604800

Request headers

:method
GET
:authority
img.teleflora.com
:scheme
https
:path
/image/upload/q_100,f_auto/v1586472347/bluecore/T15F100C_ENV
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
sec-fetch-site
none
sec-fetch-mode
navigate
sec-fetch-user
?1
sec-fetch-dest
document
accept-encoding
gzip, deflate, br
accept-language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36

Response headers

status
200
content-disposition
inline; filename="T15F100C_ENV.webp"
content-type
image/webp
etag
"ff57a7f1447363fbf906e5e2c2d76734"
last-modified
Fri, 17 Apr 2020 04:45:44 GMT
date
Fri, 22 May 2020 16:51:51 GMT
vary
Accept,User-Agent
strict-transport-security
max-age=604800
cache-control
private, no-transform, max-age=300
server-timing
fastly;dur=123;cpu=0;start=2020-05-22T16:51:51.238Z;desc=miss,rtt;dur=5,cloudinary;dur=29;start=2020-05-22T16:51:51.287Z
server
Cloudinary
timing-allow-origin
*
access-control-allow-origin
*
access-control-expose-headers
Content-Length,Content-Disposition,ETag,Server-Timing,Vary
accept-ranges
bytes
content-length
155720

Verdicts & Comments Add Verdict or Comment

2 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onformdata object| onpointerrawupdate

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=604800

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

img.teleflora.com
2a04:4e42:3::513
48b49be94d6102ee8ac17479132a4dc9c13b1138e796b3fdde77c2db8ff8241c