Submitted URL: https://script.crazyegg.com:443/pages/scripts/0082/2584.js?432881
Effective URL: https://script.crazyegg.com/pages/scripts/0082/2584.js?432881
Submission: On May 22 via manual from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 2606:4700::6813:9408, located in United States and belongs to CLOUDFLARENET - Cloudflare, Inc., US. The main domain is script.crazyegg.com.
TLS certificate: Issued by COMODO ECC Domain Validation Secure S... on December 20th 2018. Valid for: 9 months.
This is the first time this domain was scanned on urlscan.io!

Verdict: Unknown

Domain & IP information

IP Address AS Autonomous System
1 2606:4700::68... 13335 (CLOUDFLAR...)
1 1
Domain
Subdomains
Transfer
1 crazyegg.com
38 KB
1 1
Domain Requested by
1 script.crazyegg.com
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
ssl945600.cloudflaressl.com
COMODO ECC Domain Validation Secure Server CA 2
2018-12-20 -
2019-09-18
9 months

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /cloudflare/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Adblocked 2584.js?432881
/pages/scripts/0082
135 KB
38 KB
Document
General
Full URL
https://script.crazyegg.com/pages/scripts/0082/2584.js?432881
Protocol
H2
Security
TLS 1.3, , AES_128_GCM
Server
2606:4700::6813:9408 , United States, ASN13335 (CLOUDFLARENET - Cloudflare, Inc., US),
Reverse DNS
Software
cloudflare /
Resource Hash
cc0f9ff42d41c45b7f1bc8ba23e8f31d2400c1e14990fcd47ccb80531cdcb544
Blocked
Source: easylist, Type: privacy (This would have been blocked)

Request headers

:method
GET
:authority
script.crazyegg.com
:scheme
https
:path
/pages/scripts/0082/2584.js?432881
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Wed, 22 May 2019 15:18:45 GMT
content-type
application/x-javascript
set-cookie
__cfduid=d8e1e27d29fae5d662275e55b67e64f1e1558538325; expires=Thu, 21-May-20 15:18:45 GMT; path=/; domain=.crazyegg.com; HttpOnly
last-modified
Wed, 22 May 2019 15:13:33 GMT
cache-control
private, max-age=300
content-encoding
gzip
vary
Accept-Encoding
x-cache
Miss from cloudfront
via
1.1 1f95d1a95c6f2df8073daccac07b7570.cloudfront.net (CloudFront)
x-amz-cf-id
WKrUFeVps2lZSmWyn6AAhupAt_T8TcfocshmoxNUOn3_swxrUMXgyg==
cf-cache-status
MISS
expect-ct
max-age=604800, report-uri="https://report-uri.cloudflare.com/cdn-cgi/beacon/expect-ct"
server
cloudflare
cf-ray
4dafc3b3ddccc28b-FRA

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
.crazyegg.com/ Name: __cfduid
Value: d8e1e27d29fae5d662275e55b67e64f1e1558538325

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

script.crazyegg.com


2606:4700::6813:9408

cc0f9ff42d41c45b7f1bc8ba23e8f31d2400c1e14990fcd47ccb80531cdcb544