URL: http://feeds.megaphone.fm/FLM5023899770
Submission: On September 05 via manual from US

Summary

This website contacted 2 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 69.16.175.10, located in Phoenix, United States and belongs to HIGHWINDS3 - Highwinds Network Group, Inc., US. The main domain is feeds.megaphone.fm.
This is the only time feeds.megaphone.fm was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 69.16.175.10 20446 (HIGHWINDS3)
1 2
Apex Domain
Subdomains
Transfer
1 megaphone.fm
feeds.megaphone.fm
997 KB
1 1
Domain Requested by
1 feeds.megaphone.fm
1 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://feeds.megaphone.fm/FLM5023899770
Frame ID: AE8785C4F7456B2B9C5EF3A9AF294B86
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /Cowboy/i

Overall confidence: 100%
Detected patterns
  • headers server /Cowboy/i

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

2
IPs

1
Countries

997 kB
Transfer

996 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request FLM5023899770
feeds.megaphone.fm/
996 KB
997 KB
Document
General
Full URL
http://feeds.megaphone.fm/FLM5023899770
Protocol
HTTP/1.1
Server
69.16.175.10 Phoenix, United States, ASN20446 (HIGHWINDS3 - Highwinds Network Group, Inc., US),
Reverse DNS
hwcdn.net
Software
Cowboy /
Resource Hash
dae221f8af9e8a0dbe678b7bf2971fe6cfee0441becab76af7925113bc9535a7
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
feeds.megaphone.fm
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
X-DevTools-Emulate-Network-Conditions-Client-Id
AE8785C4F7456B2B9C5EF3A9AF294B86

Response headers

Date
Wed, 05 Sep 2018 20:30:26 GMT
Connection
Keep-Alive
Accept-Ranges
bytes
Content-Length
1020188
Content-Type
application/xml; charset=utf-8
Server
Cowboy
X-Frame-Options
SAMEORIGIN
X-Xss-Protection
1; mode=block
X-Content-Type-Options
nosniff
Cache-Control
no-cache, no-store, must-revalidate, private, max-age=0
Access-Control-Allow-Origin
*
Access-Control-Allow-Methods
GET, OPTIONS
Access-Control-Allow-Headers
Origin, Content-Type, Accept, Authorization, Token
Access-Control-Max-Age
604800
X-Request-Id
0c9b702f-aeca-4ec2-8fc9-ef37c6523184
X-Runtime
0.035482
Via
1.1 vegur
X-HW
1536179426.dop002.fr8.t,1536179426.cds051.fr8.c
truncated
/
112 B
0
Image
General
Full URL
data:truncated
Protocol
DATA
Server
-, , ASN (),
Reverse DNS
Software
/
Resource Hash
7a9ebfb7c3ecda0476f5c7350a344469673eb940d967b3bf40054fe667570f0a

Request headers

Response headers

Access-Control-Allow-Origin
*
Content-Type
image/svg+xml

Verdicts & Comments Add Verdict or Comment

0 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

feeds.megaphone.fm
69.16.175.10
7a9ebfb7c3ecda0476f5c7350a344469673eb940d967b3bf40054fe667570f0a
dae221f8af9e8a0dbe678b7bf2971fe6cfee0441becab76af7925113bc9535a7