URL: https://vulnerabledoma.in/xss_2020-06/?code=%3C%5C%2Fscript%3E%26callback%3Dopener.document.write
Submission Tags: falconsandbox
Submission: On June 10 via api from US

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 2 HTTP transactions. The main IP is 160.16.203.205, located in Tokyo, Japan and belongs to SAKURA-B SAKURA Internet Inc., JP. The main domain is vulnerabledoma.in.
TLS certificate: Issued by R3 on April 25th 2021. Valid for: 3 months.
This is the only time vulnerabledoma.in was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 160.16.203.205 9370 (SAKURA-B ...)
2 1
Apex Domain
Subdomains
Transfer
2 vulnerabledoma.in
vulnerabledoma.in
2 KB
2 1
Domain Requested by
2 vulnerabledoma.in vulnerabledoma.in
2 1

This site contains links to these domains. Also see Links.

Domain
twitter.com
challenge.benhayak.com
Subject Issuer Validity Valid
l0.cm
R3
2021-04-25 -
2021-07-24
3 months crt.sh

This page contains 1 frames:

Primary Page: https://vulnerabledoma.in/xss_2020-06/?code=%3C%5C%2Fscript%3E%26callback%3Dopener.document.write
Frame ID: 29C79CDA754212D4D4106220CD0E619C
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /(?:Apache(?:$|\/([\d.]+)|[^/-])|(?:^|\b)HTTPD)/i

Page Statistics

2
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

1
Subdomains

1
IPs

1
Countries

2 kB
Transfer

4 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
vulnerabledoma.in/xss_2020-06/
4 KB
2 KB
Document
General
Full URL
https://vulnerabledoma.in/xss_2020-06/?code=%3C%5C%2Fscript%3E%26callback%3Dopener.document.write
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
160.16.203.205 Tokyo, Japan, ASN9370 (SAKURA-B SAKURA Internet Inc., JP),
Reverse DNS
tk2-243-31451.vs.sakura.ne.jp
Software
Apache /
Resource Hash
8b42f11d52423a7ef4ac83c2579a22e47ecbeb01b9c0057e9d3b7dbac9fd301c

Request headers

Host
vulnerabledoma.in
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 10 Jun 2021 12:34:42 GMT
Server
Apache
Last-Modified
Wed, 01 Jul 2020 18:11:24 GMT
ETag
"1139-5a965383f0b00-gzip"
Accept-Ranges
bytes
Vary
Accept-Encoding
Content-Encoding
gzip
Content-Length
1925
Keep-Alive
timeout=5, max=100
Connection
Keep-Alive
Content-Type
text/html
check_code.php
vulnerabledoma.in/xss_2020-06/
63 B
310 B
Script
General
Full URL
https://vulnerabledoma.in/xss_2020-06/check_code.php?callback=callback&code=%3C%5C/script%3E&callback=opener.document.write
Requested by
Host: vulnerabledoma.in
URL: https://vulnerabledoma.in/xss_2020-06/?code=%3C%5C%2Fscript%3E%26callback%3Dopener.document.write
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
160.16.203.205 Tokyo, Japan, ASN9370 (SAKURA-B SAKURA Internet Inc., JP),
Reverse DNS
tk2-243-31451.vs.sakura.ne.jp
Software
Apache /
Resource Hash
5514ce95fb9fc4259cc02591c487b1254635573dbcb111275d3f9354f285acce
Security Headers
Name Value
X-Content-Type-Options nosniff
X-Xss-Protection 0

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
vulnerabledoma.in
Accept-Language
en-US
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://vulnerabledoma.in/xss_2020-06/?code=%3C%5C%2Fscript%3E%26callback%3Dopener.document.write
Connection
keep-alive
Referer
https://vulnerabledoma.in/xss_2020-06/?code=%3C%5C%2Fscript%3E%26callback%3Dopener.document.write
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/89.0.4389.72 Safari/537.36

Response headers

Date
Thu, 10 Jun 2021 12:34:42 GMT
X-Content-Type-Options
nosniff
Server
Apache
Content-Type
text/javascript; charset=utf-8
Connection
Keep-Alive
Keep-Alive
timeout=5, max=99
Content-Length
63
X-XSS-Protection
0

Verdicts & Comments Add Verdict or Comment

14 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| cookieStore function| showDirectoryPicker function| showOpenFilePicker function| showSaveFilePicker boolean| originAgentCluster object| trustedTypes boolean| crossOriginIsolated function| callback function| checkCode function| getQuery

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

vulnerabledoma.in
160.16.203.205
5514ce95fb9fc4259cc02591c487b1254635573dbcb111275d3f9354f285acce
8b42f11d52423a7ef4ac83c2579a22e47ecbeb01b9c0057e9d3b7dbac9fd301c