igg.go.ug
Open in
urlscan Pro
209.85.52.66
Public Scan
Submission: On August 05 via manual from DK
Summary
This is the only time igg.go.ug was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 4 | 209.85.52.66 209.85.52.66 | 36351 (SOFTLAYER) (SOFTLAYER) | |
3 | 1 |
Domain | Requested by | |
---|---|---|
4 | igg.go.ug |
1 redirects
igg.go.ug
|
3 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid |
---|
This page contains 2 frames:
Primary Page:
http://igg.go.ug/static/
Frame ID: D8D0AFE8EF7D20270DE3DC75D292916A
Requests: 2 HTTP requests in this frame
Frame:
http://igg.go.ug/static/hacked%20By%20Chinafans_files/bM7SZ5SBzyY.html
Frame ID: 9E5A5F499D18076E4BB71F73D0B2F5AB
Requests: 1 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
http://igg.go.ug/static
HTTP 301
http://igg.go.ug/static/ Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- headers server /php\/?([\d.]+)?/i
Python (Programming Languages) Expand
Detected patterns
- headers server /(?:^|\s)Python(?:\/([\d.]+))?/i
- headers server /mod_wsgi(?:\/([\d.]+))?/i
FreeBSD (Operating Systems) Expand
Detected patterns
- headers server /FreeBSD(?: ([\d.]+))?/i
OpenSSL (Web Server Extensions) Expand
Detected patterns
- headers server /OpenSSL(?:\/([\d.]+[a-z]?))?/i
mod_wsgi (Web Server Extensions) Expand
Detected patterns
- headers server /mod_wsgi(?:\/([\d.]+))?/i
Apache (Web Servers) Expand
Detected patterns
- headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i
- headers server /mod_wsgi(?:\/([\d.]+))?/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://igg.go.ug/static
HTTP 301
http://igg.go.ug/static/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
3 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
igg.go.ug/static/ Redirect Chain
|
3 KB 3 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
alan-walker.jpg
igg.go.ug/static/hacked%20By%20Chinafans_files/ |
246 B 246 B |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bM7SZ5SBzyY.html
igg.go.ug/static/hacked%20By%20Chinafans_files/ Frame 9E5A |
247 B 555 B |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
igg.go.ug
209.85.52.66
b219fe0e744dc3539a7418d9b476dadf1e95adf40f0d4c00022bbc953d0f1fbf
b28ba19f948dea01eadec86245c8cdc8dd7a6a07147e02a9b47b43fd3a3665de
c5efdc040fa7beff8d50559dae02f4331ddf9103dc96276fd3f918379f2a9131