login.juaralaundry.id
Open in
urlscan Pro
198.252.106.253
Public Scan
Effective URL: http://login.juaralaundry.id/login
Submission: On November 22 via automatic, source certstream-suspicious
Summary
This is the only time login.juaralaundry.id was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
1 11 | 198.252.106.253 198.252.106.253 | 20068 (HAWKHOST) (HAWKHOST - Hawk Host Inc.) | |
10 | 1 |
ASN20068 (HAWKHOST - Hawk Host Inc., CA)
PTR: 198.252.106.253-static.reverse.arandomserver.com
www.login.juaralaundry.id | |
login.juaralaundry.id |
Apex Domain Subdomains |
Transfer | |
---|---|---|
11 |
juaralaundry.id
1 redirects
www.login.juaralaundry.id login.juaralaundry.id |
425 KB |
10 | 1 |
Domain | Requested by | |
---|---|---|
10 | login.juaralaundry.id |
login.juaralaundry.id
|
1 | www.login.juaralaundry.id | 1 redirects |
10 | 2 |
This site contains links to these domains. Also see Links.
Domain |
---|
www.azostech.com |
Subject Issuer | Validity | Valid |
---|
This page contains 1 frames:
Primary Page:
http://login.juaralaundry.id/login
Frame ID: CEADBEB2B8EECE5C82D3045C835008E3
Requests: 10 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
-
https://www.login.juaralaundry.id/
HTTP 307
http://login.juaralaundry.id/login Page URL
Detected technologies
PHP (Programming Languages) ExpandDetected patterns
- html /<input[^>]+name="ci_csrf_token"/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
CodeIgniter (Web Frameworks) Expand
Detected patterns
- html /<input[^>]+name="ci_csrf_token"/i
LiteSpeed (Web Servers) Expand
Detected patterns
- headers server /^LiteSpeed$/i
Font Awesome (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+(?:([\d.]+)\/)?(?:css\/)?font-awesome(?:\.min)?\.css/i
jQuery (JavaScript Libraries) Expand
Detected patterns
- script /jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?/i
Page Statistics
1 Outgoing links
These are links going to different origins than the main page.
Title: Azost Technology
Search URL Search Domain Scan URL
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
-
https://www.login.juaralaundry.id/
HTTP 307
http://login.juaralaundry.id/login Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
10 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H/1.1 |
Primary Request
Cookie set
login
login.juaralaundry.id/ Redirect Chain
|
4 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
bootstrap.min.css
login.juaralaundry.id/assets/plugins/bootstrap/ |
120 KB 25 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
az-core.css
login.juaralaundry.id/assets/plugins/az-core/ |
8 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
az-core-left-theme.css
login.juaralaundry.id/assets/plugins/az-core/ |
9 KB 3 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
az_theme.css
login.juaralaundry.id/application/azlaundry/default/assets/plugins/az_theme/ |
4 KB 2 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
font-awesome.css
login.juaralaundry.id/assets/plugins/fa/ |
27 KB 7 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
jquery.min.js
login.juaralaundry.id/assets/plugins/jquery/ |
82 KB 33 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
logo.png
login.juaralaundry.id/application/azlaundry/default/assets/images/ |
72 KB 73 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
OpenSans-Regular.ttf
login.juaralaundry.id/assets/fonts/ |
212 KB 213 KB |
Font
font/ttf |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
fontawesome-webfont.woff2
login.juaralaundry.id/assets/plugins/fonts/ |
65 KB 65 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
4 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate function| $ function| jQuery1 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
login.juaralaundry.id/ | Name: ci_session_azlaundry Value: ed19b44c8b15dbe6d36c09ecec989b7757ae709b |
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
login.juaralaundry.id
www.login.juaralaundry.id
198.252.106.253
07c5124759c6ce713b9dc49fd8f470b219f55c0c96b4195e415b5079b0cbb478
31fbd99641c212a6ad3681a2397bde13c148c0ccd98385bce6a7eb7c81417d87
a92d8d4cac04e652395f20624db5b314030eaeb34b33a1a8523891e5645521e9
ae2139a12ff7204561d594b6caf445aaa6b591439265e8d8f59a9d6696507d9e
cdb8ab71524aa62e04f3fa87806bdb88d3d94d06f3659f66a2a74773966865f5
ddd92f10ad162c7449eff0acaf40598c05b1111739587edb75e5326b6697c5d5
e64e508b2aa2880f907e470c4550980ec4c0694d103a43f36150ac3f93189bee
f16ab224bb962910558715c82f58c10c3ed20f153ddfaa199029f141b5b0255c
fa1b3fb673e0542f640e99cf454ff024fb73a80eb00d6a0f2946bf2e2d33d950
ff82aeed6b9bb6701696c84d1b223d2e682eb78c89117a438ce6cfea8c498995