wawf.eb.mil
Open in
urlscan Pro
156.112.92.132
Public Scan
Submission: On April 23 via manual from US
Summary
TLS certificate: Issued by DOD ID SW CA-38 on April 27th 2016. Valid for: 3 years.
This is the only time wawf.eb.mil was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
15 | 156.112.92.132 156.112.92.132 | 5974 (DNIC-ASBL...) (DNIC-ASBLK-05800-06055 - DoD Network Information Center) | |
15 | 1 |
ASN5974 (DNIC-ASBLK-05800-06055 - DoD Network Information Center, US)
PTR: wawf.eb.mil
wawf.eb.mil |
Apex Domain Subdomains |
Transfer | |
---|---|---|
15 |
eb.mil
wawf.eb.mil |
476 KB |
15 | 1 |
Domain | Requested by | |
---|---|---|
15 | wawf.eb.mil |
wawf.eb.mil
|
15 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.dla.mil |
wawftraining.eb.mil |
www.whitehouse.gov |
itunes.apple.com |
play.google.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
wawf.eb.mil DOD ID SW CA-38 |
2016-04-27 - 2019-04-28 |
3 years | crt.sh |
This page contains 1 frames:
Primary Page:
https://wawf.eb.mil/
Frame ID: F5E6BC51251415F7793695E6384F2CE2
Requests: 15 HTTP requests in this frame
Screenshot
Detected technologies
Modernizr (JavaScript Libraries) ExpandDetected patterns
- env /^Modernizr$/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- env /^jQuery$/i
Twitter Bootstrap () Expand
Detected patterns
- html /<link[^>]+?href="[^"]+bootstrap(?:\.min)?\.css/i
Page Statistics
5 Outgoing links
These are links going to different origins than the main page.
Title:
Search URL Search Domain Scan URL
Title: See the What's New in 5.11.1 training for walkthroughs of the new PIEE structure
Search URL Search Domain Scan URL
Title: https://www.whitehouse.gov/sites/whitehouse.gov/files/omb/memoranda/2015/m-15-19.pdf
Search URL Search Domain Scan URL
Title: Apple App Store (External Link)
Search URL Search Domain Scan URL
Title: Google Play (External Link)
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
/
wawf.eb.mil/ |
31 KB 10 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
wawf.eb.mil/resources/css/ |
123 KB 21 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
final.css
wawf.eb.mil/resources/css/ |
33 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
x.png
wawf.eb.mil/resources/img/ |
162 B 867 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logoBackground.png
wawf.eb.mil/resources/img/ |
162 B 867 B |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
oamSubmit.js.xhtml
wawf.eb.mil/javax.faces.resource/ |
2 KB 2 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery-1.12.4.min.js
wawf.eb.mil/resources/js/vendor/ |
95 KB 34 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
modernizr-2.6.2-respond-1.1.0.min.js
wawf.eb.mil/resources/js/vendor/ |
19 KB 9 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.js
wawf.eb.mil/resources/js/vendor/ |
36 KB 11 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
final.js
wawf.eb.mil/resources/js/ |
64 KB 20 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
session.final.js
wawf.eb.mil/resources/js/ |
7 KB 3 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
sprites.png
wawf.eb.mil/resources/img/ |
293 KB 293 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
1YwB1sO8YE1Lyjf12WNiUA.woff2
wawf.eb.mil/resources/fonts/ |
23 KB 23 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
glyphicons-halflings-regular.woff2
wawf.eb.mil/resources/fonts/ |
18 KB 18 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
H2DMvhDLycM56KNuAtbJYA.woff2
wawf.eb.mil/resources/fonts/ |
22 KB 23 KB |
Font
text/plain |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
98 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| antiClickjack object| myfaces function| $ function| jQuery object| html5 object| Modernizr function| yepnope object| respond object| jQuery11240085075908021645 object| deployJava function| getJREVersion function| checkLocationCode function| demo function| selectCertificate function| toggle function| blanket_size function| window_pos function| popup function| getBrowserVersion function| getBrowserName boolean| submitted function| pleaseWait function| isSubmitted function| hidePleaseWait function| convertInputToDate function| openUrlInNewWindow function| openPortalWindow function| openTimerWindow function| autoFocus function| displayModal function| displayGroupAdmin function| displayDeptAdmin object| keyStop function| keydown function| fileUploadIEEnterButton function| iterateButtons boolean| altKey function| keyup function| checkIfAltKey function| checkIfAltKeyFF function| onFileSelect function| checkAlt function| openHelpPage function| detectJavaVersion function| displayWindowsVersion function| displayBrowserInformation function| viewAttachment function| openPortalMrsWindow function| logout function| cacLogout function| getFormattedTime function| displayRequiredModal function| buildJsonAutoComplete function| buildAutoCompleteByJsonValue function| addSelectorAutoComplete function| addDataTableChildRows function| adjustScreenForFixedNavBar function| loadImageCaptcha function| loadAudioCaptcha function| displayErrorPopover function| populateOrganization function| initRolesTable function| initAdminRolesTable function| includeAllAdminInputs function| getPurgeConfirm function| clickButtonOnEnter function| Spinner string| sessionButtons string| expiredButtons string| sessionMessage string| sessionModal boolean| primfaceModal boolean| iraptModal undefined| appName boolean| unauth number| timeout number| timeoutWarning undefined| message object| popupTimer object| expTimer object| cookieTimer boolean| expired function| setSessionExpiration function| sessionExpirationCallback function| findAboutToExpireTimers function| refreshSession function| refreshSessionOnServer function| sessionCancel function| setCookieForExpiringApps function| onWindowClose function| handleExpiredApp function| handleExpiringApps function| showHideSessionModal function| getApplicationName function| getCookieExpirationTime function| killSessionOnServer function| closeExpiredPopup function| initModals2 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
wawf.eb.mil/ | Name: ID Value: 0001yasmqqutnWUupRyW4PJuyBXAeaoEog4ytDF14GkUEYgo2zzV5HNJRbGEm7UocUMG:195nmltfa |
|
wawf.eb.mil/ | Name: oam.Flash.RENDERMAP.TOKEN Value: czx1iyc0p |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Public-Key-Pins | pin-sha256="80MntPybZzcIvKSf1Zz8pnwFiNghC44HJ9E0W/DHA7U="; pin-sha256="U6JQfsHS1UEZxScOZ0Jd/Vjko1sRILW8cLby7dsSTJA="; max-age=2592000; includeSubDomains; report-uri=https://wawf.eb.mil/hpkp-report |
Strict-Transport-Security | max-age=63072000; includeSubdomains; preload |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
X-Xss-Protection | 1; mode=block |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
wawf.eb.mil
156.112.92.132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