unimpregnated-traitorousness.herokuapp.com Open in urlscan Pro
3.220.153.112  Public Scan

URL: http://unimpregnated-traitorousness.herokuapp.com/
Submission: On March 12 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 3 HTTP transactions. The main IP is 3.220.153.112, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is unimpregnated-traitorousness.herokuapp.com.
This is the only time unimpregnated-traitorousness.herokuapp.com was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
3 3.220.153.112 14618 (AMAZON-AES)
3 1
Apex Domain
Subdomains
Transfer
3 herokuapp.com
unimpregnated-traitorousness.herokuapp.com
46 KB
3 1
Domain Requested by
3 unimpregnated-traitorousness.herokuapp.com unimpregnated-traitorousness.herokuapp.com
3 1

This site contains no links.

Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://unimpregnated-traitorousness.herokuapp.com/
Frame ID: 2CC1001EDF1BD7915BC39BC20D613B61
Requests: 3 HTTP requests in this frame

Screenshot


Page Statistics

3
Requests

0 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

46 kB
Transfer

142 kB
Size

1
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

3 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request Cookie set /
unimpregnated-traitorousness.herokuapp.com/
670 B
1 KB
Document
General
Full URL
http://unimpregnated-traitorousness.herokuapp.com/
Protocol
HTTP/1.1
Server
3.220.153.112 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-220-153-112.compute-1.amazonaws.com
Software
thin /
Resource Hash
4e3e323ce961e045d24e7c97fedc6d663981ddf9ce0e8e46f487690747d2ab14
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
unimpregnated-traitorousness.herokuapp.com
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Fri, 12 Mar 2021 13:38:29 GMT
Connection
close
X-Frame-Options
SAMEORIGIN
X-Xss-Protection
1; mode=block
X-Content-Type-Options
nosniff
Content-Type
text/html; charset=utf-8
Etag
W/"e9e23ef590659943d6e6f60af4d9b84b"
Cache-Control
max-age=0, private, must-revalidate
Set-Cookie
_leadgenie-heroku-tracker_session=RU95azB4ZmNSWDJyUTNNVmY2ZnBodmxpY1Jqc28vRlhUaEc5dmtzUGJNaVlLRW1MVXgxT1YyT25SNjZiNWZnN3F4bEd1M1dzcE44ZjZvcW43N1hVU29IQVcwejIrc0tvWTB2cHZXK2ZYSXdiNWJJUkcrckRNd2tXbDhLZHB3VGQ3VzNkZFl2TDRpdUI3NHV5TDNxSEx3PT0tLWtJazd5RU42VG9qaUhLM2I3MmhHaEE9PQ%3D%3D--3681e9e0c7cb193e8611aea37ece4703fefc4464; path=/; HttpOnly
X-Request-Id
070ad916-3398-4728-885c-e0b269ee0550
X-Runtime
0.010206
Server
thin
Via
1.1 vegur
application-e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.css
unimpregnated-traitorousness.herokuapp.com/assets/
0
267 B
Stylesheet
General
Full URL
http://unimpregnated-traitorousness.herokuapp.com/assets/application-e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855.css
Requested by
Host: unimpregnated-traitorousness.herokuapp.com
URL: http://unimpregnated-traitorousness.herokuapp.com/
Protocol
HTTP/1.1
Server
3.220.153.112 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-220-153-112.compute-1.amazonaws.com
Software
thin /
Resource Hash
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855

Request headers

Referer
http://unimpregnated-traitorousness.herokuapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Fri, 12 Mar 2021 13:38:29 GMT
Content-Encoding
gzip
Last-Modified
Tue, 07 Nov 2017 23:58:10 GMT
Server
thin
Vary
Accept-Encoding
Content-Type
text/css
Via
1.1 vegur
Connection
keep-alive
Content-Length
20
application-28d4a137893d231fe163a121f22b566429f57e304a4b5fadb40017288f03515e.js
unimpregnated-traitorousness.herokuapp.com/assets/
141 KB
44 KB
Script
General
Full URL
http://unimpregnated-traitorousness.herokuapp.com/assets/application-28d4a137893d231fe163a121f22b566429f57e304a4b5fadb40017288f03515e.js
Requested by
Host: unimpregnated-traitorousness.herokuapp.com
URL: http://unimpregnated-traitorousness.herokuapp.com/
Protocol
HTTP/1.1
Server
3.220.153.112 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-3-220-153-112.compute-1.amazonaws.com
Software
thin /
Resource Hash
28d4a137893d231fe163a121f22b566429f57e304a4b5fadb40017288f03515e

Request headers

Referer
http://unimpregnated-traitorousness.herokuapp.com/
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Fri, 12 Mar 2021 13:38:29 GMT
Content-Encoding
gzip
Last-Modified
Thu, 02 May 2019 20:32:56 GMT
Server
thin
Vary
Accept-Encoding
Content-Type
application/javascript
Via
1.1 vegur
Connection
keep-alive
Content-Length
44699

Verdicts & Comments Add Verdict or Comment

9 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated function| $ function| jQuery object| jQuery1124034744081425529094 object| Turbolinks

1 Cookies

Domain/Path Name / Value
unimpregnated-traitorousness.herokuapp.com/ Name: _leadgenie-heroku-tracker_session
Value: RU95azB4ZmNSWDJyUTNNVmY2ZnBodmxpY1Jqc28vRlhUaEc5dmtzUGJNaVlLRW1MVXgxT1YyT25SNjZiNWZnN3F4bEd1M1dzcE44ZjZvcW43N1hVU29IQVcwejIrc0tvWTB2cHZXK2ZYSXdiNWJJUkcrckRNd2tXbDhLZHB3VGQ3VzNkZFl2TDRpdUI3NHV5TDNxSEx3PT0tLWtJazd5RU42VG9qaUhLM2I3MmhHaEE9PQ%3D%3D--3681e9e0c7cb193e8611aea37ece4703fefc4464

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

unimpregnated-traitorousness.herokuapp.com
3.220.153.112
28d4a137893d231fe163a121f22b566429f57e304a4b5fadb40017288f03515e
4e3e323ce961e045d24e7c97fedc6d663981ddf9ce0e8e46f487690747d2ab14
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855