skanthak.hier-im-netz.de
Open in
urlscan Pro
2003:2:2:15:80:150:6:138
Public Scan
Effective URL: https://skanthak.hier-im-netz.de/
Submission: On July 17 via manual from BG — Scanned from DE
Summary
TLS certificate: Issued by Telekom Security ServerID OV Class 2 CA on December 11th 2023. Valid for: a year.
This is the only time skanthak.hier-im-netz.de was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 3 | 2003:2:2:15:8... 2003:2:2:15:80:150:6:138 | 3320 (DTAG Inte...) (DTAG Internet service provider operations) | |
2 | 2606:4700::68... 2606:4700::6812:1613 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2606:4700::68... 2606:4700::6812:1713 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
5 | 3 |
ASN3320 (DTAG Internet service provider operations, DE)
skanthak.homepage.t-online.de | |
skanthak.hier-im-netz.de |
Apex Domain Subdomains |
Transfer | |
---|---|---|
3 |
w3.org
www.w3.org — Cisco Umbrella Rank: 25465 jigsaw.w3.org — Cisco Umbrella Rank: 294799 |
5 KB |
2 |
hier-im-netz.de
skanthak.hier-im-netz.de |
74 KB |
1 |
t-online.de
1 redirects
skanthak.homepage.t-online.de |
81 B |
5 | 3 |
Domain | Requested by | |
---|---|---|
2 | www.w3.org |
skanthak.hier-im-netz.de
|
2 | skanthak.hier-im-netz.de | |
1 | jigsaw.w3.org |
skanthak.hier-im-netz.de
|
1 | skanthak.homepage.t-online.de | 1 redirects |
5 | 4 |
This site contains links to these domains. Also see Links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
*.hier-im-netz.de Telekom Security ServerID OV Class 2 CA |
2023-12-11 - 2024-12-15 |
a year | crt.sh |
w3.org Cloudflare Inc ECC CA-3 |
2024-01-26 - 2024-12-31 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://skanthak.hier-im-netz.de/
Frame ID: E577938BDDAB6A00BF8A51761226FE0A
Requests: 5 HTTP requests in this frame
Screenshot
Page Title
Table of ContentsPage URL History Show full URLs
-
https://skanthak.homepage.t-online.de/
HTTP 301
https://skanthak.hier-im-netz.de/ Page URL
Page Statistics
33 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Search URL Search Domain Scan URL
Title: as
Search URL Search Domain Scan URL
Title: NMAKE Reference
Search URL Search Domain Scan URL
Title: inline files
Search URL Search Domain Scan URL
Title: How the NT Loader works
Search URL Search Domain Scan URL
Title: The NT DLL Loader: basic operation
Search URL Search Domain Scan URL
Title: The NT DLL loader: dynamic unloads
Search URL Search Domain Scan URL
Title: The NT DLL Loader: DLL callouts (DllMain) – DLL_PROCESS_ATTACH deadlocks
Search URL Search Domain Scan URL
Title: The NT DLL Loader: reentrancy – play along at home!
Search URL Search Domain Scan URL
Title: The NT DLL Loader: DLL_PROCESS_ATTACH reentrancy – step 1 – LoadLibrary()
Search URL Search Domain Scan URL
Title: The NT DLL Loader: DLL_PROCESS_ATTACH reentrancy – step 2 – GetProcAddress()
Search URL Search Domain Scan URL
Title: The NT DLL Loader: DLL_PROCESS_ATTACH reentrancy – step 3 – quality requirements
Search URL Search Domain Scan URL
Title: The NT DLL Loader: DLL_PROCESS_ATTACH reentrancy – step 4 – ramifications of questionable quality
Search URL Search Domain Scan URL
Title: The NT DLL Loader: DLL_PROCESS_ATTACH reentrancy – wrap up
Search URL Search Domain Scan URL
Title: The NT DLL Loader: FreeLibrary()
Search URL Search Domain Scan URL
Title: DLL Preloading Attacks
Search URL Search Domain Scan URL
Title: MS09-014: Addressing the Safari Carpet Bomb vulnerability
Search URL Search Domain Scan URL
Title: More information about the DLL Preloading remote attack vector
Search URL Search Domain Scan URL
Title: An update on the DLL-preloading remote attack vector
Search URL Search Domain Scan URL
Title: MS14-019 – Fixing a binary hijacking via .cmd or .bat file
Search URL Search Domain Scan URL
Title: Load Library Safely
Search URL Search Domain Scan URL
Title: Triaging a DLL planting vulnerability
Search URL Search Domain Scan URL
Title: Downloads Folder: A Binary Planting Minefield
Search URL Search Domain Scan URL
Title: Carpet Bombing and Directory Poisoning
Search URL Search Domain Scan URL
Title: Bypassing Application Whitelisting
Search URL Search Domain Scan URL
Title: Dynamic-Link Library Security
Search URL Search Domain Scan URL
Title: Dynamic-Link Library Search Order
Search URL Search Domain Scan URL
Title: Insecure Library Loading Could Allow Remote Code Execution
Search URL Search Domain Scan URL
Title: Secure loading of libraries to prevent DLL preloading attacks
Search URL Search Domain Scan URL
Title: Microsoft Security Advisory: Insecure library loading could allow remote code execution
Search URL Search Domain Scan URL
Title: X.509
Search URL Search Domain Scan URL
Title: CVE®
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://skanthak.homepage.t-online.de/
HTTP 301
https://skanthak.hier-im-netz.de/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
5 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
Primary Request
/
skanthak.hier-im-netz.de/ Redirect Chain
|
59 KB 59 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
valid-html401.png
www.w3.org/Icons/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
vcss-blue.png
jigsaw.w3.org/css-validator/images/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
valid-svg10.png
www.w3.org/Icons/ |
1 KB 2 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
favicon.ico
skanthak.hier-im-netz.de/ |
15 KB 15 KB |
Other
image/x-icon |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
0 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
.w3.org/ | Name: __cf_bm Value: GtFp_kC_Zkd.PU4.CkhUGI9B5aEp2gPGf.Qeaj.LDBw-1721200966-1.0.1.1-qOvCI9tkfJNeQKSvxHB0xPX9WvM5F0tm_NoiLvY2b0A9NCu3LNwNO0ZjNFOb9sQ3BpCA76eCDi9kp0v.XYxnuQ |
2 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
jigsaw.w3.org
skanthak.hier-im-netz.de
skanthak.homepage.t-online.de
www.w3.org
2003:2:2:15:80:150:6:138
2606:4700::6812:1613
2606:4700::6812:1713
27805a0e3b95dffa94283b175c23373defb1f74a4ca07562dc5e1608829bd151
57e62d46a66a6d1b51916e0dbb064791e0d87cc0c18c8ff5024b199db260a95b
79883b62e1ce6e2694e326045d0db38260d5797ec04e27a154917a1c7f223754
d5140c2bca788a8a557cac3fb9234947d9e840bd8276524c179e21f179b8a74e
f996ac34ece9b9fed1a15c408091b6b7645fa6fc82bd88bcf4a41dfa3e87e4df