![](/screenshots/82f093b7-9a5e-4812-a8fa-1befdd15272d.png)
kraken14i.at
Open in
urlscan Pro
104.21.80.202
Public Scan
Submission: On June 15 via automatic, source certstream-suspicious — Scanned from AT
Summary
TLS certificate: Issued by WE1 on June 14th 2024. Valid for: 3 months.
This is the only time kraken14i.at was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
2 | 104.21.80.202 104.21.80.202 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 1 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
2 |
kraken14i.at
kraken14i.at |
5 KB |
2 | 1 |
Domain | Requested by | |
---|---|---|
2 | kraken14i.at | |
2 | 1 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
kraken14i.at WE1 |
2024-06-14 - 2024-09-12 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://kraken14i.at/
Frame ID: A38D91A642A44222C65890FDA2B9AF8A
Requests: 2 HTTP requests in this frame
0 Outgoing links
These are links going to different origins than the main page.
Redirected requests
There were HTTP redirect chains for the following requests:
2 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
kraken14i.at/ |
6 KB 4 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon-32x32.png
kraken14i.at/img/favicon/ |
857 B 1 KB |
Other
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
kraken14i.at/ | Name: pmbetav3 Value: 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-oHSNqBjRPMBpuj2xpOROgfHixlzyJcljsP8SQl |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
kraken14i.at
104.21.80.202
0ab9181816fa972639ae4d575dc6c95a9e60009576b28ab5578d45acf56d88c8
ac062a0c99ddec89547750c4e93f00893b7c790ec82eca6ec151bb3cf223bda0