sso.poisontestdrop.ru
Open in
urlscan Pro
2606:4700:20::681a:106
Public Scan
Effective URL: https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3...
Submission: On July 26 via automatic, source certstream-suspicious — Scanned from US
Summary
TLS certificate: Issued by E6 on July 26th 2024. Valid for: 3 months.
This is the only time sso.poisontestdrop.ru was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 27 | 2606:4700:20:... 2606:4700:20::681a:106 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
32 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
27 |
poisontestdrop.ru
3 redirects
sso.poisontestdrop.ru |
565 KB |
32 | 1 |
Domain | Requested by | |
---|---|---|
27 | sso.poisontestdrop.ru |
3 redirects
sso.poisontestdrop.ru
|
32 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
sso.poisontestdrop.ru E6 |
2024-07-26 - 2024-10-24 |
3 months | crt.sh |
This page contains 4 frames:
Primary Page:
https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fsso.poisontestdrop.ru%2Fadmin%2Fmaster%2Fconsole%2F&state=35eeb692-f682-4682-b9dc-35753f5e1f3d&response_mode=fragment&response_type=code&scope=openid&nonce=4ea4c7df-2d43-4b28-8bd6-e563f86bb9b2&code_challenge=-l6uoKxsMo3yPBqQupTUDcXeJnOC14ASVBm9xmXgWgM&code_challenge_method=S256
Frame ID: FE4C5B41B7924D9C789275861C78AFE3
Requests: 26 HTTP requests in this frame
Frame:
https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/3p-cookies/step2.html
Frame ID: A5076C979135601F280F4AE29C529822
Requests: 2 HTTP requests in this frame
Frame:
https://sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/scripts/jsd/2db5e1cc2adc/main.js
Frame ID: AA7D47003E5B974467120AB329F2E288
Requests: 2 HTTP requests in this frame
Frame:
https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/login-status-iframe.html
Frame ID: 4011DDCEE0D218A789CA34C38F638AB3
Requests: 2 HTTP requests in this frame
Screenshot
Page Title
Sign in to KeycloakPage URL History Show full URLs
-
https://sso.poisontestdrop.ru/
HTTP 302
https://sso.poisontestdrop.ru/admin/ HTTP 302
https://sso.poisontestdrop.ru/admin/master/console/ Page URL
- https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&... Page URL
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://sso.poisontestdrop.ru/
HTTP 302
https://sso.poisontestdrop.ru/admin/ HTTP 302
https://sso.poisontestdrop.ru/admin/master/console/ Page URL
- https://sso.poisontestdrop.ru/realms/master/protocol/openid-connect/auth?client_id=security-admin-console&redirect_uri=https%3A%2F%2Fsso.poisontestdrop.ru%2Fadmin%2Fmaster%2Fconsole%2F&state=35eeb692-f682-4682-b9dc-35753f5e1f3d&response_mode=fragment&response_type=code&scope=openid&nonce=4ea4c7df-2d43-4b28-8bd6-e563f86bb9b2&code_challenge=-l6uoKxsMo3yPBqQupTUDcXeJnOC14ASVBm9xmXgWgM&code_challenge_method=S256 Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 0- https://sso.poisontestdrop.ru/ HTTP 302
- https://sso.poisontestdrop.ru/admin/ HTTP 302
- https://sso.poisontestdrop.ru/admin/master/console/
- https://sso.poisontestdrop.ru/cdn-cgi/challenge-platform/scripts/jsd/main.js HTTP 302
- https://sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/scripts/jsd/2db5e1cc2adc/main.js
32 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
sso.poisontestdrop.ru/admin/master/console/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-C9t2UlUN.js
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
565 KB 167 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index-DmufuwSM.css
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
683 KB 68 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RedHatText-Medium-C_mvOOeZ.woff2
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
28 KB 29 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
RedHatText-Regular-nZJ6sD2S.woff2
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/assets/ |
28 KB 28 KB |
Font
application/octet-stream |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
react-jsx-runtime.production.min.js
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/vendor/react/ |
959 B 873 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
react.production.min.js
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/vendor/react/ |
7 KB 3 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
react-dom.production.min.js
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/vendor/react-dom/ |
130 KB 42 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step1.html
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/3p-cookies/ Frame A507 |
2 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.js
sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/scripts/jsd/2db5e1cc2adc/ Frame AA7D Redirect Chain
|
8 KB 4 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
POST H2 |
8a9432ad6dd00d4c
sso.poisontestdrop.ru/cdn-cgi/challenge-platform/h/g/jsd/r/ Frame AA7D |
0 655 B |
XHR
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
step2.html
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/3p-cookies/ Frame A507 |
686 B 1 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login-status-iframe.html
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/ Frame 4011 |
4 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.svg
sso.poisontestdrop.ru/resources/exq3w/admin/keycloak.v2/ |
7 KB 3 KB |
Other
image/svg+xml |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
init
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/login-status-iframe.html/ Frame 4011 |
0 0 |
Fetch
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
Primary Request
auth
sso.poisontestdrop.ru/realms/master/protocol/openid-connect/ |
5 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patternfly.min.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/@patternfly/patternfly/ |
1 MB 137 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patternfly.min.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/css/ |
178 KB 31 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
patternfly-additions.min.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/css/ |
220 KB 30 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pficon.css
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/lib/pficon/ |
540 B 614 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/css/ |
11 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
menu-button-links.js
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/js/ |
7 KB 2 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
passwordVisibility.js
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/js/ |
698 B 594 B |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
authChecker.js
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/js/ |
2 KB 1 KB |
Script
text/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
keycloak-bg.png
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
keycloak-logo-text.png
sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Light-webfont.woff2
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.woff2
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.woff2
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Light-webfont.woff
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
OpenSans-Regular-webfont.woff
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
fontawesome-webfont.woff
sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/ |
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/keycloak-bg.png
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/login/keycloak/img/keycloak-logo-text.png
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/OpenSans-Light-webfont.woff2
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/OpenSans-Regular-webfont.woff2
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/fontawesome-webfont.woff2?v=4.7.0
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/OpenSans-Light-webfont.woff
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/OpenSans-Regular-webfont.woff
- Domain
- sso.poisontestdrop.ru
- URL
- https://sso.poisontestdrop.ru/resources/exq3w/common/keycloak/node_modules/patternfly/dist/fonts/fontawesome-webfont.woff?v=4.7.0
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
4 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
sso.poisontestdrop.ru/realms/master/ | Name: AUTH_SESSION_ID Value: 1eebe571-6065-4b60-adf2-90dee037a177.keycloak-app-0-24648 |
|
sso.poisontestdrop.ru/realms/master/ | Name: AUTH_SESSION_ID_LEGACY Value: 1eebe571-6065-4b60-adf2-90dee037a177.keycloak-app-0-24648 |
|
sso.poisontestdrop.ru/realms/master/ | Name: KC_RESTART Value: eyJhbGciOiJIUzUxMiIsInR5cCIgOiAiSldUIiwia2lkIiA6ICI2YTRjZjdhNS04NzIxLTQ5NjEtOGRlYy0zODNiYThlZjU2MmYifQ.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.Ok1Ac4xNujj6g8gwLOFMc8U6E0NTrOimaLtqoupCCpeRcGnsNJRqni0-K6NSsOiJueCi11ZxLC4IY9NdnU-FYQ |
|
.poisontestdrop.ru/ | Name: cf_clearance Value: GQp.JOAtHt4goIMmmSTpIbxrPWjEcO_dDZbEl69w7UM-1721994900-1.0.1.1-E3bQBHViF62f6P8YW.anDkTucL7CSs4vtwumIcmWNhS0kC6zqvjd.UY0iLengQX4TftlVMA0f19FruerycnkDA |
3 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Content-Security-Policy | frame-src 'self'; frame-ancestors 'self'; object-src 'none'; |
Strict-Transport-Security | max-age=31536000; includeSubDomains |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
sso.poisontestdrop.ru
sso.poisontestdrop.ru
2606:4700:20::681a:106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