URL: https://top-fwz1.mail.ru/js/code.js
Submission: On February 19 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 217.69.133.211, located in Russian Federation and belongs to MAILRU-AS Mail.Ru, RU. The main domain is top-fwz1.mail.ru.
TLS certificate: Issued by GlobalSign Organization Validation CA... on January 18th 2019. Valid for: 2 years.
This is the first time this domain was scanned on urlscan.io!

Verdict: Unknown

Domain & IP information

IP Address AS Autonomous System
1 217.69.133.211 47764 (MAILRU-AS...)
1 1
Domain
Subdomains
Transfer
1 mail.ru
7 KB
1 1
Domain Requested by
1 top-fwz1.mail.ru
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
*.mail.ru
GlobalSign Organization Validation CA - SHA256 - G2
2019-01-18 -
2021-01-18
2 years

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Adblocked Cookie set code.js
/js
15 KB
7 KB
Document
General
Full URL
https://top-fwz1.mail.ru/js/code.js
Protocol
HTTP/1.1
Security
TLS 1.2, ECDHE_ECDSA, AES_128_GCM
Server
217.69.133.211 , Russian Federation, ASN47764 (MAILRU-AS Mail.Ru, RU),
Reverse DNS
Software
nginx /
Resource Hash
ebbb663bedc3b610e6888a048f07993490dc3495d85d70da36daee87b09826f5
Blocked
Source: easylist, Type: privacy (This would have been blocked)
Security Headers
Name Value
X-Content-Type-Options nosniff

Request headers

Host
top-fwz1.mail.ru
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

Server
nginx
Date
Tue, 19 Feb 2019 05:46:32 GMT
Content-Type
application/javascript
Last-Modified
Thu, 29 Nov 2018 15:19:38 GMT
Transfer-Encoding
chunked
Connection
keep-alive
Keep-Alive
timeout=60
ETag
W/"5c00038a-3ce9"
Set-Cookie
FTID=2vt4RA2HcIXn:1550555192:0:::; path=/; expires=Mon, 21-Feb-22 05:46:32 GMT; domain=.mail.ru; HttpOnly
Access-Control-Allow-Origin
*
Access-Control-Allow-Credentials
true
AMP-Access-Control-Allow-Source-Origin
*
Access-Control-Expose-Headers
AMP-Access-Control-Allow-Source-Origin
X-Content-Type-Options
nosniff
P3P
CP="NOI DSP COR NID CUR PSA OUR NOR"
Timing-Allow-Origin
*
Cache-control
max-age=43200, private
Content-Encoding
gzip

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
.mail.ru/ Name: FTID
Value: 2vt4RA2HcIXn:1550555192:0:::

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
X-Content-Type-Options nosniff

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

top-fwz1.mail.ru


217.69.133.211

ebbb663bedc3b610e6888a048f07993490dc3495d85d70da36daee87b09826f5