activate.blinn.edu
Open in
urlscan Pro
64.92.184.36
Public Scan
Effective URL: https://activate.blinn.edu/PasswordWeb/
Submission: On August 16 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by InCommon RSA Server CA on August 20th 2020. Valid for: a year.
This is the only time activate.blinn.edu was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 30 | 64.92.184.36 64.92.184.36 | 22645 (NTG) (NTG) | |
29 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
30 |
blinn.edu
1 redirects
activate.blinn.edu |
7 MB |
29 | 1 |
Domain | Requested by | |
---|---|---|
30 | activate.blinn.edu |
1 redirects
activate.blinn.edu
|
29 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
activate.blinn.edu InCommon RSA Server CA |
2020-08-20 - 2021-08-20 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://activate.blinn.edu/PasswordWeb/
Frame ID: 06493FC1D78FFF967D9FD55A9FFA6696
Requests: 29 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://activate.blinn.edu/ Page URL
-
https://activate.blinn.edu/PasswordWeb
HTTP 302
https://activate.blinn.edu/PasswordWeb/ Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
- html /<input[^>]+name="__VIEWSTATE/i
Material Design Lite (Web Frameworks) Expand
Detected patterns
- html /<link[^>]* href="[^"]*material(?:\.[\w]+-[\w]+)?(?:\.min)?\.css/i
Microsoft ASP.NET (Web Frameworks) Expand
Detected patterns
- html /<input[^>]+name="__VIEWSTATE/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
- html /<input[^>]+name="__VIEWSTATE/i
Dojo (JavaScript Libraries) Expand
Detected patterns
- script /([\d.]+)\/dojo\/dojo(?:\.xd)?\.js/i
Hammer.js (JavaScript Libraries) Expand
Detected patterns
- script /hammer(?:\.min)?\.js/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://activate.blinn.edu/ Page URL
-
https://activate.blinn.edu/PasswordWeb
HTTP 302
https://activate.blinn.edu/PasswordWeb/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
29 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
activate.blinn.edu/ |
639 B 788 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
/
activate.blinn.edu/PasswordWeb/ Redirect Chain
|
16 KB 16 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
claro.css
activate.blinn.edu/PasswordWeb/res.axd/199651605/dijit/themes/claro/ |
134 KB 134 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Slider.css
activate.blinn.edu/PasswordWeb/res.axd/199651605/dijit/themes/claro/form/ |
9 KB 9 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RangeSlider.css
activate.blinn.edu/PasswordWeb/res.axd/199651605/dojox/form/resources/ |
769 B 810 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kendo.common-material.min.css
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/styles/ |
242 KB 242 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kendo.material.min.css
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/styles/ |
100 KB 100 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kendo.material.mobile.min.css
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/styles/ |
110 KB 110 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
268 KB 268 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
51 B 113 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
2 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.min.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/js/ |
95 KB 95 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
head
activate.blinn.edu/PasswordWeb/bundles/ |
2 MB 2 MB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hammer.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/hammerJS/ |
60 KB 61 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery.hammer.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/hammerJS/ |
3 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hammer.fakemultitouch.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/hammerJS/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
hammer.showtouches.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/hammerJS/ |
4 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kendo.all.min.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/js/ |
3 MB 3 MB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kendo.culture.en-US.min.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/js/cultures/ |
5 KB 5 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
dojo.js
activate.blinn.edu/PasswordWeb/res.axd/199651605/dojo/ |
26 KB 26 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.png
activate.blinn.edu/PasswordWeb/Images/ |
4 KB 4 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
form
activate.blinn.edu/PasswordWeb/bundles/ |
66 KB 66 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
287 KB 287 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
kendoui.woff
activate.blinn.edu/PasswordWeb/res.axd/199651605/kendoui/styles/images/ |
63 KB 63 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
10 KB 10 KB |
Font
font/x-woff |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
286 KB 286 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
284 KB 284 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
res.axd
activate.blinn.edu/PasswordWeb/ |
60 B 130 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
devicestate
activate.blinn.edu/PasswordWeb/imx/ |
10 B 50 B |
XHR
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
25 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated object| imxboot function| $ function| jQuery object| angularJs object| imx function| createImxNamespaces function| head object| jQuery1124000117577017364634 object| angular function| elementResizeDetectorMaker function| Hammer object| kendo function| define function| require2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
activate.blinn.edu/ | Name: ASP.NET_SessionId Value: xmmuju23o1ekunrmeocdgv1r |
|
activate.blinn.edu/PasswordWeb | Name: antifix Value: f51ac895-34d1-4ca7-b0db-ff6bd18d4432 |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
activate.blinn.edu
64.92.184.36
1338b8b94ce7603b4a4e0bc93d29ce8a2a1855c79013401ca663730193df472a
27c5546211af2e0c5f1302d2071c9bbe77685db7c3c0940af3460257ff8c80ae
3bccbf04749596122b21adb2e0f6377722729fb3041611869954f702614d90c1
4419f8b182643a9d725154fef87017889f57afe12e853b50903033732bf329f6
45f5c9e80d9d3119293bd756d1a9510aeeed3b8212ca391af3994c1e6ade42fe
5705ecafdaa64d8af74d0c03f89272a65cfee9f7e62b55016a8dcbe4a69b6f86
5b688d5d9599dcaaec2534a6f4c4d4f1948f2216d05f96c1a143d7a5cbac9289
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
71d10a86b4c54a5a9c0c8b467e53ac67d79edb96c956e4e9f65a7074dfb9992a
7487db76a32f6d5dcdc23bbb995d9c86875c7ead99480ed2b9261b32c47cca4d
8329d2b4c1c7c96260d03217cae87833a6d0ff4196fa889ddb239641198db846
8a5be99e3af70bb3bf31c8e23db020bfbe2b1a5a89217dc61c64c58aba65149f
8b36f6917f86b8af43f28778c270ff111040f444b3027fac292e206dd3572de5
9774c1d73da28301cd1459de5b456e6f41c1da4317957671cee059544f7db66f
988f998c11330b6767a1f9d27da27228da68990b16b9c5f1c0a4d4975937f26c
9ce66c7265f36bd2c16187200cf14b0a68d566fa62d58b6806e3707b05587323
a7d7728817f3c112be361465e4d8106c0b9166e0a2e337962bc6698b96336c85
b7061fa67d992e2cf5518f1164d0f478ac85baba12de5e9657d55ecf1a61a4a9
bce9ae1a4b6c16635a0f3075944d3f4f48d082eab011006035fb91ef29748236
d306d68ea3b45100f0659ad86ab6e16228e0afb9b8eadbbe1dc051236047cc9c
da4f442e66843990825ed4757e27ad3442cad83f9844cc503e8ece85e00f77f2
de5b4bcf1a4ede113468a0357d906df6b759979490c13a02297fa49120f4f095
df212954f612ca3d6bbb169f6a836e87c7acb3dc14e6180d3e67c2d91b13be7d
dfaaa51fd05dded58cfdd91216ef6be5bcf98eb714c536d710b0a1c1ba61a38d
e126b7667b9a90e956a8b3bd6d4614bcaf07867a9d82a0d33251ecf4f1e7cf53
e7711d7a9672558c534f6ca1c73472ad0434d991baf78101b20c0811c4fc0c30
f0345c95f3d0937768cf6346f87e7880942ba421aa3e8372523b7ebcffacb8d0
f124c447db44e12db0895a4a3edc1f6759d1ef13776d93fc434b4074bd752798