web--public--warp-team-api--coia-mfs4.code.run Open in urlscan Pro
34.105.225.70  Public Scan

Submitted URL: http://web--public--warp-team-api--coia-mfs4.code.run/
Effective URL: https://web--public--warp-team-api--coia-mfs4.code.run/
Submission Tags: falconsandbox
Submission: On February 17 via api from US — Scanned from GB

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions. The main IP is 34.105.225.70, located in London, United Kingdom and belongs to GOOGLE-CLOUD-PLATFORM, US. The main domain is web--public--warp-team-api--coia-mfs4.code.run.
TLS certificate: Issued by R3 on February 6th 2023. Valid for: 3 months.
This is the only time web--public--warp-team-api--coia-mfs4.code.run was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 2 34.105.225.70 396982 (GOOGLE-CL...)
1 1
Apex Domain
Subdomains
Transfer
2 code.run
web--public--warp-team-api--coia-mfs4.code.run
33 KB
1 1
Domain Requested by
2 web--public--warp-team-api--coia-mfs4.code.run 1 redirects
1 1

This site contains no links.

Subject Issuer Validity Valid
*.code.run
R3
2023-02-06 -
2023-05-07
3 months crt.sh

This page contains 1 frames:

Primary Page: https://web--public--warp-team-api--coia-mfs4.code.run/
Frame ID: 397E721479B2C1830A6BDEC6421424C2
Requests: 1 HTTP requests in this frame

Screenshot

Page Title

Sign in ・ Cloudflare Access

Page URL History Show full URLs

  1. http://web--public--warp-team-api--coia-mfs4.code.run/ HTTP 301
    https://web--public--warp-team-api--coia-mfs4.code.run/ Page URL

Page Statistics

1
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

33 kB
Transfer

33 kB
Size

0
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. http://web--public--warp-team-api--coia-mfs4.code.run/ HTTP 301
    https://web--public--warp-team-api--coia-mfs4.code.run/ Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
web--public--warp-team-api--coia-mfs4.code.run/
Redirect Chain
  • http://web--public--warp-team-api--coia-mfs4.code.run/
  • https://web--public--warp-team-api--coia-mfs4.code.run/
33 KB
33 KB
Document
General
Full URL
https://web--public--warp-team-api--coia-mfs4.code.run/
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
34.105.225.70 London, United Kingdom, ASN396982 (GOOGLE-CLOUD-PLATFORM, US),
Reverse DNS
70.225.105.34.bc.googleusercontent.com
Software
istio-envoy /
Resource Hash
994aa6c4d16c8d34cb676e8e8a9b43787581f7bd3ee5693617856a428cf82726

Request headers

Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/110.0.5481.100 Safari/537.36
accept-language
en-GB,en;q=0.9

Response headers

accept-ranges
bytes
content-length
33333
content-type
text/html; charset=utf-8
date
Fri, 17 Feb 2023 10:03:57 GMT
last-modified
Tue, 01 Jan 1980 00:00:01 GMT
server
istio-envoy
x-envoy-upstream-service-time
3

Redirect headers

content-length
0
date
Fri, 17 Feb 2023 10:03:57 GMT
location
https://web--public--warp-team-api--coia-mfs4.code.run/
server
istio-envoy

Verdicts & Comments Add Verdict or Comment

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

boolean| credentialless object| oncontentvisibilityautostatechange function| get function| addFragmentToURLState string| fragment object| article object| dset boolean| autoRedirectToIdentity string| autoRedirectURL undefined| url undefined| state undefined| link undefined| services

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

web--public--warp-team-api--coia-mfs4.code.run
34.105.225.70
994aa6c4d16c8d34cb676e8e8a9b43787581f7bd3ee5693617856a428cf82726