Submitted URL: https://mailfoogae.appspot.com/t?sender=aZ21zYXJ3YXIxOTcyQGdtYWlsLmNvbQ%3D%3D&ty pe=zerocontent&guid=80be4b43-28c3-491e-9505-ed23d1ff4ba9
Effective URL: https://mailfoogae.appspot.com/t?sender=aZ21zYXJ3YXIxOTcyQGdtYWlsLmNvbQ%3D%3D&ty%20pe=zerocontent&guid=80be4b43-28c3-491e-9505-ed23d1ff4ba9
Submission: On February 11 via manual from CA

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 1 HTTP transactions.
The main IP is 2a00:1450:4001:81e::2014, located in Ireland and belongs to GOOGLE - Google LLC, US. The main domain is mailfoogae.appspot.com.
TLS certificate: Issued by Google Internet Authority G3 on January 23rd 2019. Valid for: 3 months.
This is the first time this domain was scanned on urlscan.io!

Verdict: Unknown

Domain & IP information

IP Address AS Autonomous System
1 2a00:1450:400... 15169 (GOOGLE)
1 1
Domain
Subdomains
Transfer
1 mailfoogae.appspot.com
377 B
1 1
Domain Requested by
1 mailfoogae.appspot.com
1 1

This site contains links to these domains. Also see Links.

Domain
Subject / Issuer Validity Valid
*.appspot.com
Google Internet Authority G3
2019-01-23 -
2019-04-17
3 months

Screenshot


Detected technologies

Web
Overall confidence: 100%
Detected patterns
  • headers server /nginx(?:\/([\d.]+))?/i


Stats

0
Requests

0
Ad-blocked

0
Malicious

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

0
IPs

0
Countries

0 kB
Transfer

0 kB
Size

0
Cookies

1 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Verified t?sender=aZ21zYXJ3YXIxOTcyQGdtYWlsLmNvbQ%3D%3D&ty%20pe=zerocontent&guid=80be4b43-28c3-491e-9505-ed23d1ff4ba9
43 B
377 B
Document
General
Full URL
https://mailfoogae.appspot.com/t?sender=aZ21zYXJ3YXIxOTcyQGdtYWlsLmNvbQ%3D%3D&ty%20pe=zerocontent&guid=80be4b43-28c3-491e-9505-ed23d1ff4ba9
Protocol
H2
Security
TLS 1.2, ECDHE_RSA, AES_128_GCM
Server
2a00:1450:4001:81e::2014 , Ireland, ASN15169 (GOOGLE - Google LLC, US),
Reverse DNS
Software
nginx/1.13.12 /
Resource Hash
b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b
Verified resource
fancybox/2.1.5/blank.gif at cdnjs.com, project fancybox

Request headers

:method
GET
:authority
mailfoogae.appspot.com
:scheme
https
:path
/t?sender=aZ21zYXJ3YXIxOTcyQGdtYWlsLmNvbQ%3D%3D&ty%20pe=zerocontent&guid=80be4b43-28c3-491e-9505-ed23d1ff4ba9
pragma
no-cache
cache-control
no-cache
upgrade-insecure-requests
1
user-agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36
accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/webp,image/apng,*/*;q=0.8
accept-encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_13_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.87 Safari/537.36

Response headers

status
200
date
Mon, 11 Feb 2019 16:58:20 GMT
content-type
image/png
content-length
43
server
nginx/1.13.12
x-streak-request-id
5c61a9ac1090a24217be50abe3b2d67c5ad1e2cf3b4f3459be9d8fdccda78b2a6f6e55e521981466c06da504f2a40dbeb57de424
set-cookie
tv=8787ecd0-16d6-4c3a-a35b-7e600988a2bb;Path=/;Expires=Thu, 08-Feb-2029 16:58:20 GMT
expires
Thu, 01 Jan 1970 00:00:00 GMT
cache-control
no-cache, max-age=0
via
1.1 google
alt-svc
quic=":443"; ma=2592000; v="44,43,39"

Redirect requests

There were HTTP redirects (301, 302) for the following requests:

3 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onselectstart object| onselectionchange function| queueMicrotask

1 Cookies

Domain/Path Name / Value
mailfoogae.appspot.com/ Name: tv
Value: 8787ecd0-16d6-4c3a-a35b-7e600988a2bb

Indicators of compromise (IoCs)

This is a term in the security industry to describe indicators around an attack. This includes IPs, hashes, domains, etc.

mailfoogae.appspot.com


2a00:1450:4001:81e::2014

b1442e85b03bdcaf66dc58c7abb98745dd2687d86350be9a298a1d9382ac849b