![](/screenshots/a14c78b3-ccdb-41a2-83b7-02ebdab97e4a.png)
megazar.dev
Open in
urlscan Pro
172.67.145.170
Public Scan
Effective URL: https://megazar.dev/
Submission: On June 27 via api from US — Scanned from DE
Summary
TLS certificate: Issued by GTS CA 1P5 on May 28th 2024. Valid for: 3 months.
This is the only time megazar.dev was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
5 | 172.67.145.170 172.67.145.170 | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 6 | 2606:4700::68... 2606:4700::6811:f7cb | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
8 | 2 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
6 |
unpkg.com
3 redirects
unpkg.com — Cisco Umbrella Rank: 1008 |
413 KB |
5 |
megazar.dev
megazar.dev |
442 KB |
8 | 2 |
Domain | Requested by | |
---|---|---|
6 | unpkg.com |
3 redirects
megazar.dev
|
5 | megazar.dev |
megazar.dev
|
8 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
twitter.com |
github.com |
www.youtube.com |
app.hackthebox.com |
hackerone.com |
www.reddit.com |
Subject Issuer | Validity | Valid | |
---|---|---|---|
megazar.dev GTS CA 1P5 |
2024-05-28 - 2024-08-26 |
3 months | crt.sh |
unpkg.com GTS CA 1P5 |
2024-05-30 - 2024-08-28 |
3 months | crt.sh |
This page contains 1 frames:
Primary Page:
https://megazar.dev/
Frame ID: 22FBB4FAC0E7AFEEFD0477DF961FA8E2
Requests: 8 HTTP requests in this frame
Screenshot
![](/screenshots/a14c78b3-ccdb-41a2-83b7-02ebdab97e4a.png)
Page Title
I'm MegazarPage URL History Show full URLs
-
http://megazar.dev/
HTTP 307
https://megazar.dev/ Page URL
Detected technologies
![](/vendor/wappa/icons/Font Awesome.png)
Detected patterns
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Page Statistics
6 Outgoing links
These are links going to different origins than the main page.
Title: Twitter
Search URL Search Domain Scan URL
Title: GitHub
Search URL Search Domain Scan URL
Title: YouTube
Search URL Search Domain Scan URL
Title: HTB
Search URL Search Domain Scan URL
Title: h1
Search URL Search Domain Scan URL
Title: h1
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
http://megazar.dev/
HTTP 307
https://megazar.dev/ Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- https://unpkg.com/popper.js@1/dist/umd/popper.min.js HTTP 302
- https://unpkg.com/popper.js@1.16.1/dist/umd/popper.min.js
- https://unpkg.com/tippy.js@4 HTTP 302
- https://unpkg.com/tippy.js@4.3.5 HTTP 302
- https://unpkg.com/tippy.js@4.3.5/umd/index.all.min.js
8 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H3 |
Primary Request
/
megazar.dev/ Redirect Chain
|
13 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
tailwind.min.css
unpkg.com/tailwindcss@2.2.19/dist/ |
3 MB 392 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
logo.jpg
megazar.dev/img/ |
34 KB 34 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
email-decode.min.js
megazar.dev/cdn-cgi/scripts/5c5dd728/cloudflare-static/ |
1 KB 1 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
popper.min.js
unpkg.com/popper.js@1.16.1/dist/umd/ Redirect Chain
|
21 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
index.all.min.js
unpkg.com/tippy.js@4.3.5/umd/ Redirect Chain
|
30 KB 10 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
background.webp
megazar.dev/img/ |
400 KB 401 KB |
Image
image/webp |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H3 |
favicon.ico
megazar.dev/ |
564 B 568 B |
Other
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
5 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
undefined| event object| fence object| sharedStorage function| Popper function| tippy0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
megazar.dev
unpkg.com
172.67.145.170
2606:4700::6811:f7cb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