![](/screenshots/65da41f4-43aa-4d02-a9b1-fad84f3eabba.png)
vpn.uniriotec.br
Open in
urlscan Pro
200.156.26.36
Public Scan
Submission: On August 15 via automatic, source certstream-suspicious — Scanned from DE
Summary
TLS certificate: Issued by pfSense-64bed3dc7e4d3 on July 24th 2023. Valid for: a year.
This is the only time vpn.uniriotec.br was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 200.156.26.36 200.156.26.36 | 2715 (Fundacao ...) (Fundacao Carlos Chagas Filho de Amparo a Pesquisa) | |
8 | 1 |
ASN2715 (Fundacao Carlos Chagas Filho de Amparo a Pesquisa, BR)
vpn.uniriotec.br |
Apex Domain Subdomains |
Transfer | |
---|---|---|
8 |
uniriotec.br
vpn.uniriotec.br |
176 KB |
8 | 1 |
Domain | Requested by | |
---|---|---|
8 | vpn.uniriotec.br |
vpn.uniriotec.br
|
8 | 1 |
This site contains links to these domains. Also see Links.
Domain |
---|
pfsense.org |
netgate.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
pfSense-64bed3dc7e4d3 pfSense-64bed3dc7e4d3 |
2023-07-24 - 2024-08-25 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://vpn.uniriotec.br/
Frame ID: 9814E4B5528142CD0C7F12BF2A46636C
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/65da41f4-43aa-4d02-a9b1-fad84f3eabba.png)
Page Title
pfSense - LoginpfSense LogoDetected technologies
![](/vendor/wappa/icons/Bootstrap.png)
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Detected patterns
- jquery[.-]([\d.]*\d)[^/]*\.js
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
3 Outgoing links
These are links going to different origins than the main page.
Title: pfSense
Search URL Search Domain Scan URL
Title: Netgate.
Search URL Search Domain Scan URL
Title: View license.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
vpn.uniriotec.br/ |
9 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
vpn.uniriotec.br/vendor/bootstrap/css/ |
119 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
login.css
vpn.uniriotec.br/css/ |
3 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
csrf-magic.js
vpn.uniriotec.br/csrf/ |
7 KB 7 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
jquery-3.5.1.min.js
vpn.uniriotec.br/vendor/jquery/ |
87 KB 88 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.js
vpn.uniriotec.br/vendor/bootstrap/js/ |
39 KB 39 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
pfSense.js
vpn.uniriotec.br/js/ |
11 KB 12 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
logo.css
vpn.uniriotec.br/css/ |
86 B 244 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
11 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| events string| csrfMagicToken string| csrfMagicName object| x object| c function| CsrfMagic function| $ function| jQuery object| forms object| form undefined| func1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
vpn.uniriotec.br/ | Name: PHPSESSID Value: 42fa9a765e00055ecdbb947bda660e02 |
Security Headers
This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page
Header | Value |
---|---|
Strict-Transport-Security | max-age=31536000 |
X-Content-Type-Options | nosniff |
X-Frame-Options | SAMEORIGIN |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
vpn.uniriotec.br
200.156.26.36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