URL: https://52.3.23.125/manifest.webmanifest
Submission Tags: falconsandbox
Submission: On April 18 via api from US

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 1 HTTP transactions. The main IP is 52.3.23.125, located in Ashburn, United States and belongs to AMAZON-AES, US. The main domain is 52.3.23.125.
TLS certificate: Issued by R3 on March 6th 2021. Valid for: 3 months.
This is the only time 52.3.23.125 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 52.3.23.125 14618 (AMAZON-AES)
1 1
Apex Domain
Subdomains
Transfer
1 0
Domain Requested by
1 0

This site contains no links.

Subject Issuer Validity Valid
forum.carla.org
R3
2021-03-06 -
2021-06-04
3 months crt.sh

This page contains 1 frames:

Primary Page: https://52.3.23.125/manifest.webmanifest
Frame ID: C769AF8DA7569B917CDEB382C67F1AF1
Requests: 1 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

1
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

1 kB
Transfer

0 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request manifest.webmanifest
52.3.23.125/
424 B
1 KB
Document
General
Full URL
https://52.3.23.125/manifest.webmanifest
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_256_GCM
Server
52.3.23.125 Ashburn, United States, ASN14618 (AMAZON-AES, US),
Reverse DNS
ec2-52-3-23-125.compute-1.amazonaws.com
Software
Apache / Phusion Passenger 5.1.2
Resource Hash
d6f6b748e5dfeb8d8ef662cb2c05113905a81edd9267720aa861a6dc521f74c1
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Host
52.3.23.125
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Sun, 18 Apr 2021 17:42:56 GMT
Server
Apache
Cache-Control
no-cache, no-store
Referrer-Policy
strict-origin-when-cross-origin
X-Permitted-Cross-Domain-Policies
none
X-XSS-Protection
1; mode=block
X-Request-Id
89d23850-829e-4c10-b336-e17192eb472c
X-Discourse-Route
metadata/manifest
X-Download-Options
noopen
X-Runtime
0.011557
X-Frame-Options
SAMEORIGIN
X-Content-Type-Options
nosniff
X-Powered-By
Phusion Passenger 5.1.2
Status
200 OK
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Transfer-Encoding
chunked
Content-Type
application/manifest+json; charset=utf-8

Verdicts & Comments Add Verdict or Comment

11 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

52.3.23.125
d6f6b748e5dfeb8d8ef662cb2c05113905a81edd9267720aa861a6dc521f74c1