Submitted URL: http://tesa-bitwarden.duckdns.org/?entity=16036728
Effective URL: https://tesa-bitwarden.duckdns.org/?entity=16036728
Submission: On March 23 via manual — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 9 HTTP transactions. The main IP is 84.118.74.4, located in Münster, Germany and belongs to VODANET International IP-Backbone of Vodafone, DE. The main domain is tesa-bitwarden.duckdns.org.
TLS certificate: Issued by R3 on March 18th 2024. Valid for: 3 months.
This is the only time tesa-bitwarden.duckdns.org was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 10 84.118.74.4 3209 (VODANET I...)
9 1
Apex Domain
Subdomains
Transfer
10 duckdns.org
tesa-bitwarden.duckdns.org
1 MB
9 1
Domain Requested by
10 tesa-bitwarden.duckdns.org 1 redirects tesa-bitwarden.duckdns.org
9 1

This site contains no links.

Subject Issuer Validity Valid
tesa-bitwarden.duckdns.org
R3
2024-03-18 -
2024-06-16
3 months crt.sh

This page contains 1 frames:

Primary Page: https://tesa-bitwarden.duckdns.org/?entity=16036728
Frame ID: A192F958C854B5D78D771FFC7EB04A62
Requests: 9 HTTP requests in this frame

Screenshot

Page Title

Bitwarden Web Vault

Page URL History Show full URLs

  1. http://tesa-bitwarden.duckdns.org/?entity=16036728 HTTP 301
    https://tesa-bitwarden.duckdns.org/?entity=16036728 Page URL

Page Statistics

9
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

1103 kB
Transfer

3610 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://tesa-bitwarden.duckdns.org/?entity=16036728 HTTP 301
    https://tesa-bitwarden.duckdns.org/?entity=16036728 Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

9 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
tesa-bitwarden.duckdns.org/
Redirect Chain
  • http://tesa-bitwarden.duckdns.org/?entity=16036728
  • https://tesa-bitwarden.duckdns.org/?entity=16036728
1 KB
1 KB
Document
General
Full URL
https://tesa-bitwarden.duckdns.org/?entity=16036728
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
efff3bf471bdcf8cacfd57dc11c646c7772218f312344137aa0f6708cd63e6e8
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000 max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36
accept-language
de-DE,de;q=0.9

Response headers

content-encoding
gzip
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-type
text/html
date
Sat, 23 Mar 2024 10:02:52 GMT
etag
W/"1da43325f785f56"
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
referrer-policy
same-origin
server
openresty
strict-transport-security
max-age=15768000 max-age=63072000; preload
vary
Accept-Encoding
x-content-type-options
nosniff
x-frame-options
SAMEORIGIN
x-robots-tag
noindex, nofollow
x-served-by
tesa-bitwarden.duckdns.org
x-xss-protection
1; mode=block

Redirect headers

Connection
keep-alive
Content-Length
166
Content-Type
text/html
Date
Sat, 23 Mar 2024 10:02:52 GMT
Location
https://tesa-bitwarden.duckdns.org/?entity=16036728
Server
openresty
Strict-Transport-Security
max-age=63072000; preload
theme_head.1df11f603fda400762b7.js
tesa-bitwarden.duckdns.org/
471 B
1 KB
Script
General
Full URL
https://tesa-bitwarden.duckdns.org/theme_head.1df11f603fda400762b7.js
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/?entity=16036728
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
13fdf26631accf8bf4e263dd2ccf1563731288ee37122fffefd77bef8c1248f2
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tesa-bitwarden.duckdns.org/?entity=16036728
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
referrer-policy
same-origin
x-content-type-options
nosniff
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
etag
W/"1da43325f785a57"
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
content-type
application/javascript
x-robots-tag
noindex, nofollow
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
main.b3b0da14002100d65a67.css
tesa-bitwarden.duckdns.org/app/
259 KB
42 KB
Stylesheet
General
Full URL
https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/?entity=16036728
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
fb2c16b89c1da9400a0c0f9e554c4fb0138a20cb3fdf2d4ddd702a07e5dae6dc
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tesa-bitwarden.duckdns.org/?entity=16036728
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
W/"1da43325f7c5741"
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
content-type
text/css
cache-control
max-age=1209600
x-robots-tag
noindex, nofollow
polyfills.553f1c6e04a4256f1a4c.js
tesa-bitwarden.duckdns.org/app/
214 KB
75 KB
Script
General
Full URL
https://tesa-bitwarden.duckdns.org/app/polyfills.553f1c6e04a4256f1a4c.js
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/?entity=16036728
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
8092e0969eed04939c5a6ea64e99a92b57e1d7860be20e3e501fc8b2fc153a54
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tesa-bitwarden.duckdns.org/?entity=16036728
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
W/"1da43325f7b0367"
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
content-type
application/javascript
cache-control
max-age=1209600
x-robots-tag
noindex, nofollow
vendor.f26f777c949e70160d07.js
tesa-bitwarden.duckdns.org/app/
2 MB
884 KB
Script
General
Full URL
https://tesa-bitwarden.duckdns.org/app/vendor.f26f777c949e70160d07.js
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/?entity=16036728
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
aed43d0eeda5d37917c3221d06f59794243a2b41a7ca16527cdb9808de966b2e
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tesa-bitwarden.duckdns.org/?entity=16036728
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
W/"1da43325f5e324e"
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
content-type
application/javascript
cache-control
max-age=1209600
x-robots-tag
noindex, nofollow
main.b847be3e3892f44d9ab6.js
tesa-bitwarden.duckdns.org/app/
543 KB
0
Script
General
Full URL
https://tesa-bitwarden.duckdns.org/app/main.b847be3e3892f44d9ab6.js
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/?entity=16036728
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tesa-bitwarden.duckdns.org/?entity=16036728
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
W/"1da43325f50613e"
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
content-type
application/javascript
cache-control
max-age=1209600
x-robots-tag
noindex, nofollow
logo-dark@2x.png
tesa-bitwarden.duckdns.org/images/
6 KB
6 KB
Image
General
Full URL
https://tesa-bitwarden.duckdns.org/images/logo-dark@2x.png
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
687b7972db5d87c83515c806f06002cf3c15ecf3ac2abc36469fc27a02dfc674
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

accept-language
de-DE,de;q=0.9
Referer
https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-length
5869
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
"1da43325f784d6d"
x-frame-options
SAMEORIGIN
content-type
image/png
cache-control
max-age=604800
accept-ranges
bytes
x-robots-tag
noindex, nofollow
bwi-font.f7a43f81d823e54532d4.ttf
tesa-bitwarden.duckdns.org/fonts/
74 KB
38 KB
Font
General
Full URL
https://tesa-bitwarden.duckdns.org/fonts/bwi-font.f7a43f81d823e54532d4.ttf
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
3b2a9b0382332e17360e157605cb0c115bb82a4f6e82265d610d41a6dc103621
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
Origin
https://tesa-bitwarden.duckdns.org
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-encoding
gzip
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
W/"1da43325f7972cc"
vary
Accept-Encoding
x-frame-options
SAMEORIGIN
content-type
application/x-font-ttf
cache-control
max-age=1209600
x-robots-tag
noindex, nofollow
Open_Sans-normal-400.8465030b62273715c99d.woff
tesa-bitwarden.duckdns.org/fonts/
54 KB
55 KB
Font
General
Full URL
https://tesa-bitwarden.duckdns.org/fonts/Open_Sans-normal-400.8465030b62273715c99d.woff
Requested by
Host: tesa-bitwarden.duckdns.org
URL: https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
84.118.74.4 Münster, Germany, ASN3209 (VODANET International IP-Backbone of Vodafone, DE),
Reverse DNS
ip-084-118-074-004.um23.pools.vodafone-ip.de
Software
openresty /
Resource Hash
3adc584fb0bef1fbf9b1c0ecddde5727643b4334c734db78b517ab112d92e1d8
Security Headers
Name Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000, max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block

Request headers

Referer
https://tesa-bitwarden.duckdns.org/app/main.b3b0da14002100d65a67.css
Origin
https://tesa-bitwarden.duckdns.org
accept-language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/122.0.6261.128 Safari/537.36

Response headers

date
Sat, 23 Mar 2024 10:02:53 GMT
strict-transport-security
max-age=15768000, max-age=63072000; preload
x-content-type-options
nosniff
content-security-policy
default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
content-length
55324
x-xss-protection
1; mode=block
x-served-by
tesa-bitwarden.duckdns.org
referrer-policy
same-origin
last-modified
Tue, 09 Jan 2024 19:30:59 GMT
server
openresty
etag
"1da43325f78839c"
x-frame-options
SAMEORIGIN
content-type
application/font-woff
cache-control
max-age=1209600
accept-ranges
bytes
x-robots-tag
noindex, nofollow

Verdicts & Comments Add Verdict or Comment

148 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

function| clearImmediate function| setImmediate function| Zone function| __zone_symbol__Promise function| __zone_symbol__fetch function| __zone_symbol__legacyPatch function| __zone_symbol__queueMicrotask function| __zone_symbol__setTimeout function| __zone_symbol__clearTimeout function| __zone_symbol__setInterval function| __zone_symbol__clearInterval function| __zone_symbol__setImmediate function| __zone_symbol__clearImmediate function| __zone_symbol__requestAnimationFrame function| __zone_symbol__cancelAnimationFrame function| __zone_symbol__webkitRequestAnimationFrame function| __zone_symbol__webkitCancelAnimationFrame function| __zone_symbol__alert function| __zone_symbol__prompt function| __zone_symbol__confirm function| __zone_symbol__MutationObserver function| __zone_symbol__WebKitMutationObserver function| __zone_symbol__IntersectionObserver function| __zone_symbol__FileReader boolean| __zone_symbol__ononsearchpatched boolean| __zone_symbol__ononappinstalledpatched boolean| __zone_symbol__ononbeforeinstallpromptpatched boolean| __zone_symbol__ononbeforexrselectpatched boolean| __zone_symbol__ononabortpatched boolean| __zone_symbol__ononbeforeinputpatched boolean| __zone_symbol__ononbeforematchpatched boolean| __zone_symbol__ononbeforetogglepatched boolean| __zone_symbol__ononblurpatched boolean| __zone_symbol__ononcancelpatched boolean| __zone_symbol__ononcanplaypatched boolean| __zone_symbol__ononcanplaythroughpatched boolean| __zone_symbol__ononchangepatched boolean| __zone_symbol__ononclickpatched boolean| __zone_symbol__ononclosepatched boolean| __zone_symbol__ononcontentvisibilityautostatechangepatched boolean| __zone_symbol__ononcontextlostpatched boolean| __zone_symbol__ononcontextmenupatched boolean| __zone_symbol__ononcontextrestoredpatched boolean| __zone_symbol__ononcuechangepatched boolean| __zone_symbol__onondblclickpatched boolean| __zone_symbol__onondragpatched boolean| __zone_symbol__onondragendpatched boolean| __zone_symbol__onondragenterpatched boolean| __zone_symbol__onondragleavepatched boolean| __zone_symbol__onondragoverpatched boolean| __zone_symbol__onondragstartpatched boolean| __zone_symbol__onondroppatched boolean| __zone_symbol__onondurationchangepatched boolean| __zone_symbol__ononemptiedpatched boolean| __zone_symbol__ononendedpatched boolean| __zone_symbol__ononerrorpatched boolean| __zone_symbol__ononfocuspatched boolean| __zone_symbol__ononformdatapatched boolean| __zone_symbol__ononinputpatched boolean| __zone_symbol__ononinvalidpatched boolean| __zone_symbol__ononkeydownpatched boolean| __zone_symbol__ononkeypresspatched boolean| __zone_symbol__ononkeyuppatched boolean| __zone_symbol__ononloadpatched boolean| __zone_symbol__ononloadeddatapatched boolean| __zone_symbol__ononloadedmetadatapatched boolean| __zone_symbol__ononloadstartpatched boolean| __zone_symbol__ononmousedownpatched boolean| __zone_symbol__ononmouseenterpatched boolean| __zone_symbol__ononmouseleavepatched boolean| __zone_symbol__ononmousemovepatched boolean| __zone_symbol__ononmouseoutpatched boolean| __zone_symbol__ononmouseoverpatched boolean| __zone_symbol__ononmouseuppatched boolean| __zone_symbol__ononmousewheelpatched boolean| __zone_symbol__ononpausepatched boolean| __zone_symbol__ononplaypatched boolean| __zone_symbol__ononplayingpatched boolean| __zone_symbol__ononprogresspatched boolean| __zone_symbol__ononratechangepatched boolean| __zone_symbol__ononresetpatched boolean| __zone_symbol__ononresizepatched boolean| __zone_symbol__ononscrollpatched boolean| __zone_symbol__ononsecuritypolicyviolationpatched boolean| __zone_symbol__ononseekedpatched boolean| __zone_symbol__ononseekingpatched boolean| __zone_symbol__ononselectpatched boolean| __zone_symbol__ononslotchangepatched boolean| __zone_symbol__ononstalledpatched boolean| __zone_symbol__ononsubmitpatched boolean| __zone_symbol__ononsuspendpatched boolean| __zone_symbol__onontimeupdatepatched boolean| __zone_symbol__onontogglepatched boolean| __zone_symbol__ononvolumechangepatched boolean| __zone_symbol__ononwaitingpatched boolean| __zone_symbol__ononwebkitanimationendpatched boolean| __zone_symbol__ononwebkitanimationiterationpatched boolean| __zone_symbol__ononwebkitanimationstartpatched boolean| __zone_symbol__ononwebkittransitionendpatched boolean| __zone_symbol__ononwheelpatched boolean| __zone_symbol__ononauxclickpatched boolean| __zone_symbol__onongotpointercapturepatched boolean| __zone_symbol__ononlostpointercapturepatched boolean| __zone_symbol__ononpointerdownpatched boolean| __zone_symbol__ononpointermovepatched boolean| __zone_symbol__ononpointerrawupdatepatched boolean| __zone_symbol__ononpointeruppatched boolean| __zone_symbol__ononpointercancelpatched boolean| __zone_symbol__ononpointeroverpatched boolean| __zone_symbol__ononpointeroutpatched boolean| __zone_symbol__ononpointerenterpatched boolean| __zone_symbol__ononpointerleavepatched boolean| __zone_symbol__ononselectstartpatched boolean| __zone_symbol__ononselectionchangepatched boolean| __zone_symbol__ononanimationendpatched boolean| __zone_symbol__ononanimationiterationpatched boolean| __zone_symbol__ononanimationstartpatched boolean| __zone_symbol__onontransitionrunpatched boolean| __zone_symbol__onontransitionstartpatched boolean| __zone_symbol__onontransitionendpatched boolean| __zone_symbol__onontransitioncancelpatched boolean| __zone_symbol__ononafterprintpatched boolean| __zone_symbol__ononbeforeprintpatched boolean| __zone_symbol__ononbeforeunloadpatched boolean| __zone_symbol__ononhashchangepatched boolean| __zone_symbol__ononlanguagechangepatched boolean| __zone_symbol__ononmessagepatched boolean| __zone_symbol__ononmessageerrorpatched boolean| __zone_symbol__ononofflinepatched boolean| __zone_symbol__onononlinepatched boolean| __zone_symbol__ononpagehidepatched boolean| __zone_symbol__ononpageshowpatched boolean| __zone_symbol__ononpopstatepatched boolean| __zone_symbol__ononrejectionhandledpatched boolean| __zone_symbol__ononstoragepatched boolean| __zone_symbol__ononunhandledrejectionpatched boolean| __zone_symbol__ononunloadpatched boolean| __zone_symbol__onondevicemotionpatched boolean| __zone_symbol__onondeviceorientationpatched boolean| __zone_symbol__onondeviceorientationabsolutepatched boolean| __zone_symbol__ononscrollendpatched object| webpackChunk_bitwarden_web_vault function| __zone_symbol__addEventListener function| __zone_symbol__removeEventListener undefined| __zone_symbol__eventListeners undefined| __zone_symbol__removeAllListeners function| eventListeners function| removeAllListeners

0 Cookies

1 Console Messages

Source Level URL
Text
network error URL: https://tesa-bitwarden.duckdns.org/app/main.b847be3e3892f44d9ab6.js
Message:
Failed to load resource: net::ERR_HTTP2_PROTOCOL_ERROR

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'self'; script-src 'self' 'wasm-unsafe-eval'; style-src 'self' 'unsafe-inline'; img-src 'self' data: https://haveibeenpwned.com; child-src 'self' https://*.duosecurity.com https://*.duofederal.com; frame-src 'self' https://*.duosecurity.com https://*.duofederal.com; connect-src 'self' wss://tesa-bitwarden.duckdns.org https://api.pwnedpasswords.com https://api.2fa.directory; object-src 'self' blob:;
Strict-Transport-Security max-age=15768000 max-age=63072000; preload
X-Content-Type-Options nosniff
X-Frame-Options SAMEORIGIN
X-Xss-Protection 1; mode=block