www.threat-intelligence.eu
Open in
urlscan Pro
2a02:21d0::68:69:25
Public Scan
Submission: On October 04 via manual from US — Scanned from DE
Summary
This is the only time www.threat-intelligence.eu was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
7 | 2a02:21d0::68... 2a02:21d0::68:69:25 | 49677 (MAEHDROS-AS) (MAEHDROS-AS) | |
2 | 2606:4700::68... 2606:4700::6812:acf | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
1 | 2a00:1450:400... 2a00:1450:4001:800::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2606:4700::68... 2606:4700::6811:180e | 13335 (CLOUDFLAR...) (CLOUDFLARENET) | |
3 | 2a00:1450:400... 2a00:1450:4001:82b::2003 | 15169 (GOOGLE) (GOOGLE) | |
15 | 5 |
Apex Domain Subdomains |
Transfer | |
---|---|---|
7 |
threat-intelligence.eu
www.threat-intelligence.eu |
265 KB |
3 |
gstatic.com
fonts.gstatic.com |
45 KB |
2 |
cloudflare.com
cdnjs.cloudflare.com — Cisco Umbrella Rank: 410 |
41 KB |
2 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com — Cisco Umbrella Rank: 1683 |
85 KB |
1 |
googleapis.com
fonts.googleapis.com — Cisco Umbrella Rank: 113 |
1 KB |
15 | 5 |
Domain | Requested by | |
---|---|---|
7 | www.threat-intelligence.eu |
www.threat-intelligence.eu
|
3 | fonts.gstatic.com |
fonts.googleapis.com
|
2 | cdnjs.cloudflare.com |
www.threat-intelligence.eu
|
2 | maxcdn.bootstrapcdn.com |
www.threat-intelligence.eu
maxcdn.bootstrapcdn.com |
1 | fonts.googleapis.com |
www.threat-intelligence.eu
|
15 | 5 |
This site contains links to these domains. Also see Links.
Domain |
---|
github.com |
www.foo.be |
www.ijlter.org |
www.misp-project.org |
www.cia.gov |
irp.fas.org |
www.dni.gov |
www.activeresponse.org |
www.lockheedmartin.com |
attack.mitre.org |
cpb-eu-w2.wpmucdn.com |
jekyllrb.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://www.threat-intelligence.eu/methodologies/
Frame ID: 51D18DAA8DABF17387BCC04B91EC9B4C
Requests: 15 HTTP requests in this frame
Screenshot
Page Title
Methodologies | threat-intelligence.euDetected technologies
KaTeX (JavaScript graphics) ExpandDetected patterns
- katex(?:\.min)?\.js
Bootstrap (Web Frameworks) Expand
Detected patterns
- <link[^>]* href=[^>]*?bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.css
- bootstrap(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)[^>]*?(?:\.min)?\.js
Font Awesome (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+(?:([\d.]+)/)?(?:css/)?font-awesome(?:\.min)?\.css
- <link[^>]* href=[^>]*?(?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:[^>]*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
- (?:F|f)o(?:n|r)t-?(?:A|a)wesome(?:.*?([0-9a-fA-F]{7,40}|[\d]+(?:.[\d]+(?:.[\d]+)?)?)|)
Google Font API (Font Scripts) Expand
Detected patterns
- <link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com
Page Statistics
19 Outgoing links
These are links going to different origins than the main page.
Search URL Search Domain Scan URL
Title: Psychology of Intelligence Analysis by Richard J. Heuer, Jr. PDF
Search URL Search Domain Scan URL
Title: Judgment under Uncertainty: Heuristics and Biases
Search URL Search Domain Scan URL
Title: The Admiralty Code: A Cognitive Tool for Self-Directed Learning
Search URL Search Domain Scan URL
Title: ‘admiralty-scale’
Search URL Search Domain Scan URL
Title: Words of Estimative Probability
Search URL Search Domain Scan URL
Title: ‘estimative-language’
Search URL Search Domain Scan URL
Title: In JP 2-0, Joint Intelligence
Search URL Search Domain Scan URL
Title: Cyber Threat Framework
Search URL Search Domain Scan URL
Title: ‘cyber-threat-framework’
Search URL Search Domain Scan URL
Title: The Diamond Model of Intrusion Analysis
Search URL Search Domain Scan URL
Title: ‘diamond-model’
Search URL Search Domain Scan URL
Title: Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains
Search URL Search Domain Scan URL
Title: ‘kill-chain’
Search URL Search Domain Scan URL
Title: Adversarial Tactics, Techniques & Common Knowledge
Search URL Search Domain Scan URL
Title: galaxy
Search URL Search Domain Scan URL
Title: A Comprehensive Data Science Framework and Case Study for Investigating Organized Crime and Serving the Public Interest
Search URL Search Domain Scan URL
Title: Jekyll
Search URL Search Domain Scan URL
Title: Type Theme
Search URL Search Domain Scan URL
Redirected requests
There were HTTP redirect chains for the following requests:
Request Chain 3- http://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.8.3/katex.min.css HTTP 307
- https://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.8.3/katex.min.css
- http://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.8.3/katex.min.js HTTP 307
- https://cdnjs.cloudflare.com/ajax/libs/KaTeX/0.8.3/katex.min.js
15 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
/
www.threat-intelligence.eu/methodologies/ |
16 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
main.css
www.threat-intelligence.eu/assets/css/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.min.css
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/css/ |
30 KB 8 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
css
fonts.googleapis.com/ |
9 KB 1 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
katex.min.css
cdnjs.cloudflare.com/ajax/libs/KaTeX/0.8.3/ Redirect Chain
|
23 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
katex.min.js
cdnjs.cloudflare.com/ajax/libs/KaTeX/0.8.3/ Redirect Chain
|
175 KB 38 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
avatar.png
www.threat-intelligence.eu/assets/img/ |
10 KB 11 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
credibility-of-evidence.png
www.threat-intelligence.eu/assets/img/ |
75 KB 75 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jp-2.0.png
www.threat-intelligence.eu/assets/img/ |
167 KB 167 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
katex_init.js
www.threat-intelligence.eu/assets/js/ |
893 B 786 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
/
www.threat-intelligence.eu/ |
3 KB 3 KB |
Image
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6xK3dSBYKcSV-LCoeQqfX1RYOo3qOK7l.woff2
fonts.gstatic.com/s/sourcesanspro/v22/ |
15 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
maxcdn.bootstrapcdn.com/font-awesome/4.7.0/fonts/ |
75 KB 76 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6xKydSBYKcSV-LCoeQqfX1RYOo3ig4vwlxdu.woff2
fonts.gstatic.com/s/sourcesanspro/v22/ |
14 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
6xK1dSBYKcSV-LCoeQqfX1RYOo3qPZ7nsDI.woff2
fonts.gstatic.com/s/sourcesanspro/v22/ |
14 KB 15 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
2 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| katex object| elements0 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdnjs.cloudflare.com
fonts.googleapis.com
fonts.gstatic.com
maxcdn.bootstrapcdn.com
www.threat-intelligence.eu
2606:4700::6811:180e
2606:4700::6812:acf
2a00:1450:4001:800::200a
2a00:1450:4001:82b::2003
2a02:21d0::68:69:25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