leakbase.io
Open in
urlscan Pro
185.11.145.145
Public Scan
Submission: On July 03 via manual from TH — Scanned from NL
Summary
TLS certificate: Issued by ZeroSSL ECC Domain Secure Site CA on June 21st 2024. Valid for: 3 months.
This is the only time leakbase.io was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
3 | 185.11.145.145 185.11.145.145 | 47674 (NETSOLUTIONS) (NETSOLUTIONS) | |
1 | 2a00:1450:400... 2a00:1450:4001:830::200a | 15169 (GOOGLE) (GOOGLE) | |
1 | 104.18.11.207 104.18.11.207 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
2 | 2a00:1450:400... 2a00:1450:4001:803::2003 | 15169 (GOOGLE) (GOOGLE) | |
8 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
leakbase.io
leakbase.io |
45 KB |
2 |
gstatic.com
fonts.gstatic.com |
31 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1286 |
23 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 83 |
1 KB |
8 | 4 |
Domain | Requested by | |
---|---|---|
3 | leakbase.io |
leakbase.io
|
2 | fonts.gstatic.com |
fonts.googleapis.com
|
1 | maxcdn.bootstrapcdn.com |
leakbase.io
|
1 | fonts.googleapis.com |
leakbase.io
|
8 | 4 |
This site contains links to these domains. Also see Links.
Domain |
---|
blazingfast.io |
Subject Issuer | Validity | Valid | |
---|---|---|---|
leakbase.io ZeroSSL ECC Domain Secure Site CA |
2024-06-21 - 2024-09-19 |
3 months | crt.sh |
upload.video.google.com WR2 |
2024-06-13 - 2024-09-05 |
3 months | crt.sh |
bootstrapcdn.com GTS CA 1P5 |
2024-05-25 - 2024-08-23 |
3 months | crt.sh |
*.gstatic.com WR2 |
2024-06-13 - 2024-09-05 |
3 months | crt.sh |
This page contains 1 frames:
Frame:
https://leakbase.io/threads/x76-good-ftp-log.17326/
Frame ID: 5C2A2C49D4C7C091CF96CF8FF862BCE2
Requests: 9 HTTP requests in this frame
Screenshot
Page Title
Just a moment please...Detected technologies
Bootstrap (Web Frameworks) ExpandDetected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
jQuery (JavaScript Libraries) Expand
Detected patterns
- jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 7- https://leakbase.io/blzgfst-shark/?bfu=%2Fthreads%2Fx76-good-ftp-log.17326%2F&blazing_answer=224656886 HTTP 302
- https://leakbase.io/threads/x76-good-ftp-log.17326/
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
leakbase.io/threads/x76-good-ftp-log.17326/ |
9 KB 7 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
4 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.4/css/ |
115 KB 23 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bf.jquery.max.js
leakbase.io/ |
94 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET DATA |
truncated
/ |
4 KB 0 |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOlCnqEu92Fr1MmSU5fBBc4.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOkCnqEu92Fr1MmgVxIIzI.woff2
fonts.gstatic.com/s/roboto/v30/ |
15 KB 16 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
favicon.ico
leakbase.io/ |
196 B 414 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET |
/
leakbase.io/threads/x76-good-ftp-log.17326/ Redirect Chain
|
0 0 |
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Failed requests
These URLs were requested, but there was no response received. You will also see them in the list above.
- Domain
- leakbase.io
- URL
- https://leakbase.io/threads/x76-good-ftp-log.17326/
Verdicts & Comments Add Verdict or Comment
6 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| $ function| jQuery function| load1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.leakbase.io/ | Name: BlazingWebCookie Value: ysZcYqn4YVFZejuhwnPXYIesAYtem49d2wthjhZp6CR1k7xHSW0u5kdx2JpD0IVw |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
fonts.googleapis.com
fonts.gstatic.com
leakbase.io
maxcdn.bootstrapcdn.com
leakbase.io
104.18.11.207
185.11.145.145
2a00:1450:4001:803::2003
2a00:1450:4001:830::200a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