Submitted URL: https://rfc-editor.org/rfc/
Effective URL: https://www.rfc-editor.org/rfc/
Submission: On September 12 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 2001:1900:3001:11::31, located in United States and belongs to LEVEL3 - Level 3 Parent, LLC, US. The main domain is www.rfc-editor.org.
TLS certificate: Issued by Starfield Secure Certificate Authorit... on March 1st 2019. Valid for: a year.
This is the only time www.rfc-editor.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 2001:1900:300... 3356 (LEVEL3)
1 1
Domain
Subdomains
Transfer
2 rfc-editor.org
134 KB
1 1
Domain Requested by
1 www.rfc-editor.org
1 rfc-editor.org 1 redirects
1 2

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
*.rfc-editor.org
Starfield Secure Certificate Authority - G2
2019-03-01 -
2020-04-30
a year

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^\/-])|(?:^|\b)HTTPD)/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
/
/rfc
Redirect Chain
  • https://rfc-editor.org/rfc/
  • https://www.rfc-editor.org/rfc/
1 MB
134 KB
Document
General
Full URL
https://www.rfc-editor.org/rfc/
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
2001:1900:3001:11::31 , United States, ASN3356 (LEVEL3 - Level 3 Parent, LLC, US),
Reverse DNS
Software
Apache /
Resource Hash
0bb3ac38be21859e9f49e584831fd8f4924ca76272269b738f946b0b05321f31
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
www.rfc-editor.org
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
Sec-Fetch-Site
none
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1

Response headers

Date
Thu, 12 Sep 2019 14:10:05 GMT
Server
Apache
Vary
Accept-Encoding
Content-Encoding
gzip
Strict-Transport-Security
max-age=31536000; includeSubDomains
X-Frame-Options
SAMEORIGIN
X-Xss-Protection
1; mode=block
X-Content-Type-Options
nosniff
Keep-Alive
timeout=1, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
text/html;charset=ISO-8859-1

Redirect headers

Date
Thu, 12 Sep 2019 14:10:04 GMT
Server
Apache
Location
https://www.rfc-editor.org/rfc/
Content-Length
215
Keep-Alive
timeout=1, max=100
Connection
Keep-Alive
Content-Type
text/html; charset=iso-8859-1

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

Request 0
  • https://rfc-editor.org/rfc/
  • https://www.rfc-editor.org/rfc/

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Strict-Transport-Security max-age=31536000; includeSubDomains
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

rfc-editor.org
www.rfc-editor.org
2001:1900:3001:11::31
0bb3ac38be21859e9f49e584831fd8f4924ca76272269b738f946b0b05321f31