URL: https://auth.umcom.org/
Submission: On April 20 via automatic, source certstream-suspicious — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 11 HTTP transactions. The main IP is 216.253.72.68, located in Jacksonville, United States and belongs to LVLT-3549, US. The main domain is auth.umcom.org.
TLS certificate: Issued by R3 on April 20th 2022. Valid for: 3 months.
This is the only time auth.umcom.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
11 216.253.72.68 3549 (LVLT-3549)
11 1
Apex Domain
Subdomains
Transfer
11 umcom.org
auth.umcom.org
2 MB
11 1
Domain Requested by
11 auth.umcom.org auth.umcom.org
11 1

This site contains no links.

Subject Issuer Validity Valid
auth.umcom.org
R3
2022-04-20 -
2022-07-19
3 months crt.sh

This page contains 1 frames:

Primary Page: https://auth.umcom.org/
Frame ID: 8EAC93D6A54B1B6DACB3E3D339CFF0C2
Requests: 11 HTTP requests in this frame

Screenshot

Page Title

Bitwarden Web Vault

Page Statistics

11
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1728 kB
Transfer

6395 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

11 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
auth.umcom.org/
1 KB
1 KB
Document
General
Full URL
https://auth.umcom.org/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
be8c307294fc6a122724b40b0f95b4c30ee93ba97be0f29eb74857eb9213ca6f
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-encoding
gzip
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
content-type
text/html
date
Wed, 20 Apr 2022 18:55:13 GMT
etag
W/"1d838b666f58356"
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
referrer-policy
same-origin
server
nginx
strict-transport-security
max-age=15768000
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
theme_head.5f24ba8d7aa944e6f52b.js
auth.umcom.org/
474 B
929 B
Script
General
Full URL
https://auth.umcom.org/theme_head.5f24ba8d7aa944e6f52b.js
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
b76e4aa2161588db35331328c8a371ae1ead250ef06820f77194e26ca8f0e5a0
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
etag
W/"1d838b666f5865a"
x-frame-options
SAMEORIGIN
content-type
application/javascript
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
vary
Accept-Encoding
x-xss-protection
1; mode=block
main.d16a127214bff366a9de.css
auth.umcom.org/app/
239 KB
40 KB
Stylesheet
General
Full URL
https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
f3fca605d04d793e42f6a40ea36968e0f74857dbede6924ae0241b2bcec5f357
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d838b666f63c95"
vary
Accept-Encoding
content-type
text/css
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
polyfills.583e6938418194c8758e.js
auth.umcom.org/app/
252 KB
86 KB
Script
General
Full URL
https://auth.umcom.org/app/polyfills.583e6938418194c8758e.js
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
9fa7d72a3d7d5838c3dd7ac919123bec0227677808ca506bd7867e65f31fcf79
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d838b666f668d7"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
vendor.af29ab74f6445247ed16.js
auth.umcom.org/app/
3 MB
902 KB
Script
General
Full URL
https://auth.umcom.org/app/vendor.af29ab74f6445247ed16.js
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
386257ab8aad6a7dfe1ae5bb8f574b7341b87474de647922e9da2a827bb8d4b9
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d838b666dfdf1c"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
main.a65ba012eb7ad84a4c86.js
auth.umcom.org/app/
3 MB
517 KB
Script
General
Full URL
https://auth.umcom.org/app/main.a65ba012eb7ad84a4c86.js
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
a927a874f7c4d05b683bd5cc06d67b5a8d285f099edce4a529606495e1f290cc
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d838b666d95222"
vary
Accept-Encoding
content-type
application/javascript
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
logo-dark@2x.png
auth.umcom.org/images/
6 KB
6 KB
Image
General
Full URL
https://auth.umcom.org/images/logo-dark@2x.png
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
687b7972db5d87c83515c806f06002cf3c15ecf3ac2abc36469fc27a02dfc674
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/app/main.d16a127214bff366a9de.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
etag
"1d838b666f5916d"
x-frame-options
SAMEORIGIN
content-type
image/png
cache-control
max-age=604800
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
accept-ranges
bytes
x-robots-tag
noindex, nofollow
content-length
5869
x-xss-protection
1; mode=block
bwi-font.ttf
auth.umcom.org/fonts/
67 KB
34 KB
Font
General
Full URL
https://auth.umcom.org/fonts/bwi-font.ttf
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
8c6762f97c5704a47e59bd89b84bc355870132db1603b15edfa049afde1a00ea
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Origin
https://auth.umcom.org
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d838b666f48cbc"
vary
Accept-Encoding
content-type
application/x-font-ttf
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
Open_Sans-normal-400.woff
auth.umcom.org/fonts/
54 KB
55 KB
Font
General
Full URL
https://auth.umcom.org/fonts/Open_Sans-normal-400.woff
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
3adc584fb0bef1fbf9b1c0ecddde5727643b4334c734db78b517ab112d92e1d8
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Origin
https://auth.umcom.org
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:13 GMT
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
etag
"1d838b666f55f9c"
x-frame-options
SAMEORIGIN
content-type
application/font-woff
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
accept-ranges
bytes
x-robots-tag
noindex, nofollow
content-length
55324
x-xss-protection
1; mode=block
messages.json
auth.umcom.org/locales/en/
140 KB
29 KB
Fetch
General
Full URL
https://auth.umcom.org/locales/en/messages.json?cache=fx16g7
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/app/polyfills.583e6938418194c8758e.js
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
a59994d487c3e5689b9a41865c77fba7be76c8f933f5f3dd3312af9e8d50ef38
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://auth.umcom.org/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:14 GMT
content-encoding
gzip
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
x-frame-options
SAMEORIGIN
etag
W/"1d838b666f7a840"
vary
Accept-Encoding
content-type
application/json
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
Open_Sans-normal-600.woff
auth.umcom.org/fonts/
56 KB
57 KB
Font
General
Full URL
https://auth.umcom.org/fonts/Open_Sans-normal-600.woff
Requested by
Host: auth.umcom.org
URL: https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_256_GCM
Server
216.253.72.68 Jacksonville, United States, ASN3549 (LVLT-3549, US),
Reverse DNS
Software
nginx /
Resource Hash
9448f7c3bd336008d83d3e4730ac005be651a3a39ade1d36ebb29b5be9201235
Security Headers
Name Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://auth.umcom.org/app/main.d16a127214bff366a9de.css
Origin
https://auth.umcom.org
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/100.0.4896.75 Safari/537.36

Response headers

date
Wed, 20 Apr 2022 18:55:14 GMT
referrer-policy
same-origin
last-modified
Tue, 15 Mar 2022 21:48:27 GMT
server
nginx
etag
"1d838b666f56610"
x-frame-options
SAMEORIGIN
content-type
application/font-woff
cache-control
max-age=1209600
x-content-type-options
nosniff
content-security-policy
default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
strict-transport-security
max-age=15768000
accept-ranges
bytes
x-robots-tag
noindex, nofollow
content-length
57744
x-xss-protection
1; mode=block

Verdicts & Comments Add Verdict or Comment

165 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| 0 function| structuredClone object| oncontextlost object| oncontextrestored function| getScreenDetails function| setImmediate function| clearImmediate function| Zone function| __zone_symbol__Promise function| __zone_symbol__fetch function| __zone_symbol__legacyPatch function| __zone_symbol__queueMicrotask function| __zone_symbol__setTimeout function| __zone_symbol__clearTimeout function| __zone_symbol__setInterval function| __zone_symbol__clearInterval function| __zone_symbol__setImmediate function| __zone_symbol__clearImmediate function| __zone_symbol__requestAnimationFrame function| __zone_symbol__cancelAnimationFrame function| __zone_symbol__webkitRequestAnimationFrame function| __zone_symbol__webkitCancelAnimationFrame function| __zone_symbol__alert function| __zone_symbol__prompt function| __zone_symbol__confirm function| __zone_symbol__MutationObserver function| __zone_symbol__WebKitMutationObserver function| __zone_symbol__IntersectionObserver function| __zone_symbol__FileReader boolean| __zone_symbol__ononabortpatched boolean| __zone_symbol__ononanimationendpatched boolean| __zone_symbol__ononanimationiterationpatched boolean| __zone_symbol__ononauxclickpatched boolean| __zone_symbol__ononblurpatched boolean| __zone_symbol__ononcancelpatched boolean| __zone_symbol__ononcanplaypatched boolean| __zone_symbol__ononcanplaythroughpatched boolean| __zone_symbol__ononchangepatched boolean| __zone_symbol__ononcuechangepatched boolean| __zone_symbol__ononclickpatched boolean| __zone_symbol__ononclosepatched boolean| __zone_symbol__ononcontextmenupatched boolean| __zone_symbol__onondblclickpatched boolean| __zone_symbol__onondragpatched boolean| __zone_symbol__onondragendpatched boolean| __zone_symbol__onondragenterpatched boolean| __zone_symbol__onondragleavepatched boolean| __zone_symbol__onondragoverpatched boolean| __zone_symbol__onondroppatched boolean| __zone_symbol__onondurationchangepatched boolean| __zone_symbol__ononemptiedpatched boolean| __zone_symbol__ononendedpatched boolean| __zone_symbol__ononerrorpatched boolean| __zone_symbol__ononfocuspatched boolean| __zone_symbol__onongotpointercapturepatched boolean| __zone_symbol__ononinputpatched boolean| __zone_symbol__ononinvalidpatched boolean| __zone_symbol__ononkeydownpatched boolean| __zone_symbol__ononkeypresspatched boolean| __zone_symbol__ononkeyuppatched boolean| __zone_symbol__ononloadpatched boolean| __zone_symbol__ononloadstartpatched boolean| __zone_symbol__ononloadeddatapatched boolean| __zone_symbol__ononloadedmetadatapatched boolean| __zone_symbol__ononlostpointercapturepatched boolean| __zone_symbol__ononmousedownpatched boolean| __zone_symbol__ononmouseenterpatched boolean| __zone_symbol__ononmouseleavepatched boolean| __zone_symbol__ononmousemovepatched boolean| __zone_symbol__ononmouseoutpatched boolean| __zone_symbol__ononmouseoverpatched boolean| __zone_symbol__ononmouseuppatched boolean| __zone_symbol__ononmousewheelpatched boolean| __zone_symbol__ononpausepatched boolean| __zone_symbol__ononplaypatched boolean| __zone_symbol__ononplayingpatched boolean| __zone_symbol__ononpointercancelpatched boolean| __zone_symbol__ononpointerdownpatched boolean| __zone_symbol__ononpointerenterpatched boolean| __zone_symbol__ononpointerleavepatched boolean| __zone_symbol__ononpointermovepatched boolean| __zone_symbol__ononpointeroverpatched boolean| __zone_symbol__ononpointeruppatched boolean| __zone_symbol__ononprogresspatched boolean| __zone_symbol__ononratechangepatched boolean| __zone_symbol__ononresetpatched boolean| __zone_symbol__ononresizepatched boolean| __zone_symbol__ononscrollpatched boolean| __zone_symbol__ononseekedpatched boolean| __zone_symbol__ononseekingpatched boolean| __zone_symbol__ononselectpatched boolean| __zone_symbol__ononselectionchangepatched boolean| __zone_symbol__ononselectstartpatched boolean| __zone_symbol__ononstalledpatched boolean| __zone_symbol__ononsubmitpatched boolean| __zone_symbol__ononsuspendpatched boolean| __zone_symbol__onontimeupdatepatched boolean| __zone_symbol__ononvolumechangepatched boolean| __zone_symbol__onontransitioncancelpatched boolean| __zone_symbol__onontransitionendpatched boolean| __zone_symbol__ononwaitingpatched boolean| __zone_symbol__ononwheelpatched boolean| __zone_symbol__onontogglepatched boolean| __zone_symbol__ononafterprintpatched boolean| __zone_symbol__ononappinstalledpatched boolean| __zone_symbol__ononbeforeinstallpromptpatched boolean| __zone_symbol__ononbeforeprintpatched boolean| __zone_symbol__ononbeforeunloadpatched boolean| __zone_symbol__onondevicemotionpatched boolean| __zone_symbol__onondeviceorientationpatched boolean| __zone_symbol__onondeviceorientationabsolutepatched boolean| __zone_symbol__ononhashchangepatched boolean| __zone_symbol__ononlanguagechangepatched boolean| __zone_symbol__ononmessagepatched boolean| __zone_symbol__ononofflinepatched boolean| __zone_symbol__onononlinepatched boolean| __zone_symbol__ononpageshowpatched boolean| __zone_symbol__ononpagehidepatched boolean| __zone_symbol__ononpopstatepatched boolean| __zone_symbol__ononrejectionhandledpatched boolean| __zone_symbol__ononstoragepatched boolean| __zone_symbol__ononunhandledrejectionpatched boolean| __zone_symbol__ononunloadpatched boolean| __zone_symbol__onondragstartpatched boolean| __zone_symbol__ononanimationstartpatched boolean| __zone_symbol__ononsearchpatched boolean| __zone_symbol__onontransitionrunpatched boolean| __zone_symbol__onontransitionstartpatched boolean| __zone_symbol__ononwebkitanimationendpatched boolean| __zone_symbol__ononwebkitanimationiterationpatched boolean| __zone_symbol__ononwebkitanimationstartpatched boolean| __zone_symbol__ononwebkittransitionendpatched boolean| __zone_symbol__ononpointeroutpatched boolean| __zone_symbol__ononmessageerrorpatched object| thePicker object| webpackChunk_bitwarden_web_vault boolean| ngDevMode boolean| ngI18nClosureMode function| $localize object| __zone_symbol__loadfalse object| process object| __zone_symbol__popstatefalse object| __zone_symbol__hashchangefalse object| bitwardenContainerService function| getAngularTestability function| getAllAngularTestabilities function| getAllAngularRootElements object| frameworkStabilizers function| __zone_symbol__ON_PROPERTYmousemove object| __zone_symbol__mousemovefalse function| __zone_symbol__ON_PROPERTYmousedown object| __zone_symbol__mousedownfalse function| ontouchstart function| __zone_symbol__ON_PROPERTYclick object| __zone_symbol__clickfalse function| __zone_symbol__ON_PROPERTYscroll object| __zone_symbol__scrollfalse function| __zone_symbol__ON_PROPERTYkeypress object| __zone_symbol__keypressfalse function| __zone_symbol__addEventListener function| __zone_symbol__removeEventListener undefined| __zone_symbol__eventListeners undefined| __zone_symbol__removeAllListeners function| eventListeners function| removeAllListeners

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com https://www.gravatar.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://auth.umcom.org https://api.pwnedpasswords.com https://2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block