![](/screenshots/35acc5e7-cf8e-48db-bb96-f8a0848147df.png)
d9xmp.csb.app
Open in
urlscan Pro
172.64.148.87
Public Scan
Effective URL: https://d9xmp.csb.app/
Submission: On June 17 via api from US — Scanned from DE
Summary
TLS certificate: Issued by Cloudflare Inc ECC CA-3 on December 30th 2023. Valid for: a year.
This is the only time d9xmp.csb.app was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 1 | 2606:4700:440... 2606:4700:4400::ac40:9a6b | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
4 | 172.64.148.87 172.64.148.87 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
12 | 2606:4700:440... 2606:4700:4400::6812:2195 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 172.64.154.107 172.64.154.107 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
17 | 3 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
14 |
codesandbox.io
1 redirects
d9xmp.codesandbox.io codesandbox.io — Cisco Umbrella Rank: 108146 |
931 KB |
4 |
csb.app
d9xmp.csb.app |
301 KB |
17 | 2 |
Domain | Requested by | |
---|---|---|
13 | codesandbox.io |
d9xmp.csb.app
codesandbox.io |
4 | d9xmp.csb.app |
d9xmp.csb.app
|
1 | d9xmp.codesandbox.io | 1 redirects |
17 | 3 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
csb.app Cloudflare Inc ECC CA-3 |
2023-12-30 - 2024-12-29 |
a year | crt.sh |
codesandbox.io E1 |
2024-05-23 - 2024-08-21 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://d9xmp.csb.app/
Frame ID: 0B775AACC7CF7DAB95964FEEE61FCDAA
Requests: 16 HTTP requests in this frame
Screenshot
![](/screenshots/35acc5e7-cf8e-48db-bb96-f8a0848147df.png)
Page Title
Sandbox - CodeSandboxPage URL History Show full URLs
-
http://d9xmp.codesandbox.io/
HTTP 307
https://d9xmp.codesandbox.io/ HTTP 301
https://d9xmp.csb.app/ Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://d9xmp.codesandbox.io/
HTTP 307
https://d9xmp.codesandbox.io/ HTTP 301
https://d9xmp.csb.app/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
17 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
d9xmp.csb.app/ Redirect Chain
|
2 KB 905 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
browserfs.min.js
codesandbox.io/static/browserfs12/ |
238 KB 60 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~embed~sandbox-startup.1c90fe343.chunk.js
codesandbox.io/static/js/ |
17 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default~app~embed~sandbox~sandbox-startup.e509d996f.chunk.js
codesandbox.io/static/js/ |
16 KB 6 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sandbox-startup.2a2c6a199.js
codesandbox.io/static/js/ |
13 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~codemirror-editor~monaco-editor~sandbox.a0a9d9986.chunk.js
codesandbox.io/static/js/ |
25 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
common-sandbox.09f563264.chunk.js
codesandbox.io/static/js/ |
167 KB 46 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~app~sandbox.d07ab9245.chunk.js
codesandbox.io/static/js/ |
32 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
vendors~sandbox.cb6b5ecc4.chunk.js
codesandbox.io/static/js/ |
417 KB 114 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
default~app~embed~sandbox.73c64c50f.chunk.js
codesandbox.io/static/js/ |
71 KB 17 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
sandbox.275a9407e.js
codesandbox.io/static/js/ |
280 KB 68 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
babel.7.21.8.min.js
codesandbox.io/static/js/ |
0 592 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
d9xmp
codesandbox.io/api/v1/sandboxes/ |
29 B 468 B |
Fetch
application/json |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
babel-transpiler.38c39cda.worker.js
d9xmp.csb.app/ |
1 MB 300 KB |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
OPTIONS H2 |
d9xmp
codesandbox.io/api/v1/sandboxes/ |
0 0 |
Preflight
|
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
babel-transpiler.38c39cda.worker.js
d9xmp.csb.app/ |
1 MB 0 |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
babel-transpiler.38c39cda.worker.js
d9xmp.csb.app/ |
1 MB 0 |
Other
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
13 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| 0 undefined| event object| fence object| sharedStorage object| BrowserFS object| process function| Buffer object| csbJsonP object| babelworkers object| cosmiconfig object| prettier object| jsdom object| measurements1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.codesandbox.io/ | Name: _cfuvid Value: 4rAV24dF4tFuBeDhD8.2BpuE_UtadyfhGlJUYsNeJkk-1718628507685-0.0.1.1-604800000 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
codesandbox.io
d9xmp.codesandbox.io
d9xmp.csb.app
172.64.148.87
172.64.154.107
2606:4700:4400::6812:2195
2606:4700:4400::ac40:9a6b
2711afaef02780cd8bb99f714de289704b3f7a73ec47e4cf590e0fbe6942cea7
3d3597057745fffcaac9cf19bf6a501ca89cf5c57be9823215ba04fd4c828efe
481d3d08bf081cc8c3d0833123f315d4634f4b41e415bfbecfdf19c86dbb6656
54e6d361931c61c60c8cfb8d7482904d25ba817141b33878c0e9edf7190ce727
5c0524ad9bc8e956b8bcd47e785e8e148da9c9ccfbe8cf2ce8d63630a07ff402
73ef2d93029b3ac09cba65d92566b55331f4a2a243026c4a164197d8ce895b1e
82ced4e9e8408ade315536ad4327a167a342b2a4e7124ba1a9f0c6e5f92a438d
8f127d30a5eaaff96c29f83504429f2ff216ee82bfcbf88b2d7257e5004fd83d
98f2cf9c7a0bc3130aae18249b91c7add52aa42ca8bf91d617c6ae2872b500fa
9b20d35a713fea9527df5fd08796fe4ebb51af111d619f6d9268ebd9ab910096
d720d4ece47c46e46bad250f5c9b7e7a975ed843ab8186065a95bd4cde14f44b
d7833d29067da7c7dcc844c9f5c26353e83d60f05f49a0789ef40f07c3797f69
d7f9055b345c9af1e7dd3cc4f36f250a6c5026daba982cc18be77d80b74ce79d
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855