login.wesoft.dk
Open in
urlscan Pro
35.156.43.152
Public Scan
Effective URL: https://login.wesoft.dk/login?state=g6Fo2SBxVm1tdTN5MG5NVl9QaTFPM3pkS3RYYUZEQjlhcmVPZ6N0aWTZIDN3Vi1xNnZUUlFXMUNmM0pQXzN1...
Submission: On March 21 via automatic, source certstream-suspicious
Summary
TLS certificate: Issued by Let's Encrypt Authority X3 on March 19th 2020. Valid for: 3 months.
This is the only time login.wesoft.dk was scanned on urlscan.io!
urlscan.io Verdict: No classification
Domain & IP information
IP Address | AS Autonomous System | ||
---|---|---|---|
8 | 89.233.0.116 89.233.0.116 | 3308 (TELIANET-...) (TELIANET-DENMARK) | |
2 | 2a00:1450:400... 2a00:1450:4001:818::200a | 15169 (GOOGLE) (GOOGLE) | |
2 | 2a00:1450:400... 2a00:1450:4001:81c::2003 | 15169 (GOOGLE) (GOOGLE) | |
1 2 | 35.156.43.152 35.156.43.152 | 16509 (AMAZON-02) (AMAZON-02) | |
1 | 2001:4de0:ac1... 2001:4de0:ac19::1:b:3b | 20446 (HIGHWINDS3) (HIGHWINDS3) | |
2 | 143.204.215.119 143.204.215.119 | 16509 (AMAZON-02) (AMAZON-02) | |
16 | 6 |
ASN3308 (TELIANET-DENMARK, DK)
staging.bankafstemning.wesoft.dk |
ASN16509 (AMAZON-02, US)
PTR: ec2-35-156-43-152.eu-central-1.compute.amazonaws.com
login.wesoft.dk |
ASN16509 (AMAZON-02, US)
PTR: server-143-204-215-119.fra53.r.cloudfront.net
cdn.auth0.com |
Apex Domain Subdomains |
Transfer | |
---|---|---|
10 |
wesoft.dk
1 redirects
staging.bankafstemning.wesoft.dk login.wesoft.dk |
757 KB |
2 |
auth0.com
cdn.auth0.com |
40 KB |
2 |
gstatic.com
fonts.gstatic.com |
20 KB |
2 |
googleapis.com
fonts.googleapis.com |
2 KB |
1 |
bootstrapcdn.com
maxcdn.bootstrapcdn.com |
20 KB |
16 | 5 |
Domain | Requested by | |
---|---|---|
8 | staging.bankafstemning.wesoft.dk |
staging.bankafstemning.wesoft.dk
login.wesoft.dk |
2 | cdn.auth0.com |
login.wesoft.dk
|
2 | login.wesoft.dk |
1 redirects
staging.bankafstemning.wesoft.dk
|
2 | fonts.gstatic.com |
staging.bankafstemning.wesoft.dk
login.wesoft.dk |
2 | fonts.googleapis.com |
staging.bankafstemning.wesoft.dk
login.wesoft.dk |
1 | maxcdn.bootstrapcdn.com |
login.wesoft.dk
|
16 | 6 |
This site contains no links.
Subject Issuer | Validity | Valid | |
---|---|---|---|
bankafstemning.wesoft.dk Go Daddy Secure Certificate Authority - G2 |
2019-12-09 - 2021-12-09 |
2 years | crt.sh |
*.storage.googleapis.com GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
*.google.com GTS CA 1O1 |
2020-03-03 - 2020-05-26 |
3 months | crt.sh |
login.wesoft.dk Let's Encrypt Authority X3 |
2020-03-19 - 2020-06-17 |
3 months | crt.sh |
*.bootstrapcdn.com Sectigo RSA Domain Validation Secure Server CA |
2019-09-14 - 2020-10-13 |
a year | crt.sh |
*.auth0.com Amazon |
2019-06-21 - 2020-07-21 |
a year | crt.sh |
This page contains 1 frames:
Primary Page:
https://login.wesoft.dk/login?state=g6Fo2SBxVm1tdTN5MG5NVl9QaTFPM3pkS3RYYUZEQjlhcmVPZ6N0aWTZIDN3Vi1xNnZUUlFXMUNmM0pQXzN1TVBBb0VjTHVxcFRyo2NpZNkgNXNFaTZFTjVSM1RiRUlGbVNYV2Y0czE5Nm9iVlJoQWM&client=5sEi6EN5R3TbEIFmSXWf4s196obVRhAc&protocol=oauth2&audience=https%3A%2F%2Fwesoft.eu.auth0.com%2Fapi%2Fv2%2F&redirect_uri=https%3A%2F%2Fstaging.bankafstemning.wesoft.dk&onRedirectCallback=function(t)%7Bst.push(t%26%26t.targetUrl%3Ft.targetUrl%3Awindow.location.pathname)%7D&scope=openid%20profile%20email&response_type=code&response_mode=query&nonce=sVXeYeqoCsXviE8KtE9nWSM7iiXwg7oOF7ERQPguNGQ&code_challenge=A_i2i3_fIM9TlW7lRaOtaasGfuTrlpeSAsieByMsUqQ&code_challenge_method=S256&auth0Client=eyJuYW1lIjoiYXV0aDAtc3BhLWpzIiwidmVyc2lvbiI6IjEuNi40In0%3D
Frame ID: B7C863B5635C61DB903F6CCDBDC380BC
Requests: 16 HTTP requests in this frame
Screenshot
Page URL History Show full URLs
- https://staging.bankafstemning.wesoft.dk/ Page URL
-
https://login.wesoft.dk/authorize?audience=https%3A%2F%2Fwesoft.eu.auth0.com%2Fapi%2Fv2%2F&client_id...
HTTP 302
https://login.wesoft.dk/login?state=g6Fo2SBxVm1tdTN5MG5NVl9QaTFPM3pkS3RYYUZEQjlhcmVPZ6N0aWTZIDN3Vi1x... Page URL
Detected technologies
Windows Server (Operating Systems) ExpandDetected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Bootstrap (Web Frameworks) Expand
Detected patterns
- html /<link[^>]+?href="[^"]*bootstrap(?:\.min)?\.css/i
IIS (Web Servers) Expand
Detected patterns
- headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i
Google Font API (Font Scripts) Expand
Detected patterns
- html /<link[^>]* href=[^>]+fonts\.(?:googleapis|google)\.com/i
Page Statistics
0 Outgoing links
These are links going to different origins than the main page.
Page URL History
This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.
- https://staging.bankafstemning.wesoft.dk/ Page URL
-
https://login.wesoft.dk/authorize?audience=https%3A%2F%2Fwesoft.eu.auth0.com%2Fapi%2Fv2%2F&client_id=5sEi6EN5R3TbEIFmSXWf4s196obVRhAc&redirect_uri=https%3A%2F%2Fstaging.bankafstemning.wesoft.dk&onRedirectCallback=function(t)%7Bst.push(t%26%26t.targetUrl%3Ft.targetUrl%3Awindow.location.pathname)%7D&scope=openid%20profile%20email&response_type=code&response_mode=query&state=TG9ELnQ3S35acE9xUXJEUlEtWWZIaFJ4YUJsM0xGWVFqbzJUWmdUb3FRVw%3D%3D&nonce=sVXeYeqoCsXviE8KtE9nWSM7iiXwg7oOF7ERQPguNGQ&code_challenge=A_i2i3_fIM9TlW7lRaOtaasGfuTrlpeSAsieByMsUqQ&code_challenge_method=S256&auth0Client=eyJuYW1lIjoiYXV0aDAtc3BhLWpzIiwidmVyc2lvbiI6IjEuNi40In0%3D
HTTP 302
https://login.wesoft.dk/login?state=g6Fo2SBxVm1tdTN5MG5NVl9QaTFPM3pkS3RYYUZEQjlhcmVPZ6N0aWTZIDN3Vi1xNnZUUlFXMUNmM0pQXzN1TVBBb0VjTHVxcFRyo2NpZNkgNXNFaTZFTjVSM1RiRUlGbVNYV2Y0czE5Nm9iVlJoQWM&client=5sEi6EN5R3TbEIFmSXWf4s196obVRhAc&protocol=oauth2&audience=https%3A%2F%2Fwesoft.eu.auth0.com%2Fapi%2Fv2%2F&redirect_uri=https%3A%2F%2Fstaging.bankafstemning.wesoft.dk&onRedirectCallback=function(t)%7Bst.push(t%26%26t.targetUrl%3Ft.targetUrl%3Awindow.location.pathname)%7D&scope=openid%20profile%20email&response_type=code&response_mode=query&nonce=sVXeYeqoCsXviE8KtE9nWSM7iiXwg7oOF7ERQPguNGQ&code_challenge=A_i2i3_fIM9TlW7lRaOtaasGfuTrlpeSAsieByMsUqQ&code_challenge_method=S256&auth0Client=eyJuYW1lIjoiYXV0aDAtc3BhLWpzIiwidmVyc2lvbiI6IjEuNi40In0%3D Page URL
Redirected requests
There were HTTP redirect chains for the following requests:
16 HTTP transactions
Method Protocol |
Resource Path |
Size x-fer |
Type MIME-Type |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
GET H2 |
/
staging.bankafstemning.wesoft.dk/ |
2 KB 2 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
13 KB 963 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.9239d494.chunk.css
staging.bankafstemning.wesoft.dk/static/css/ |
5 KB 5 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.50078fbb.chunk.css
staging.bankafstemning.wesoft.dk/static/css/ |
356 B 402 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
2.a104e685.chunk.js
staging.bankafstemning.wesoft.dk/static/js/ |
563 KB 564 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
main.4400f28e.chunk.js
staging.bankafstemning.wesoft.dk/static/js/ |
50 KB 50 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wesoft-logo.3562a3f7.png
staging.bankafstemning.wesoft.dk/static/media/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
mem8YaGs126MiZpBA-UFVZ0bf8pkAg.woff2
fonts.gstatic.com/s/opensans/v17/ |
9 KB 9 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H/1.1 |
Primary Request
login
login.wesoft.dk/ Redirect Chain
|
8 KB 5 KB |
Document
text/html |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
Redirect headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bootstrap.min.css
maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/ |
118 KB 20 KB |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
css
fonts.googleapis.com/ |
5 KB 776 B |
Stylesheet
text/css |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
wesoft-logo.png
staging.bankafstemning.wesoft.dk/ |
15 KB 16 KB |
Image
image/png |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
auth0.min.js
cdn.auth0.com/js/auth0/9.12/ |
144 KB 40 KB |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
object-assign.min.js
cdn.auth0.com/js/polyfills/1.0/ |
278 B 706 B |
Script
application/javascript |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
bg1-blur24.jpg
staging.bankafstemning.wesoft.dk/ |
97 KB 97 KB |
Image
image/jpeg |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
GET H2 |
KFOmCnqEu92Fr1Mu4mxKKTU1Kg.woff2
fonts.gstatic.com/s/roboto/v20/ |
11 KB 11 KB |
Font
font/woff2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
General
Request headers
Response headers
|
Verdicts & Comments Add Verdict or Comment
3 JavaScript Global Variables
These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.
object| onformdata object| onpointerrawupdate object| auth04 Cookies
Cookies are little pieces of information stored in the browser of a user. Whenever a user visits the site again, he will also send his cookie values, thus allowing the website to re-identify him even if he changed locations. This is how permanent logins work.
Domain/Path | Expires | Name / Value |
---|---|---|
login.wesoft.dk/ | Name: auth0_compat Value: s%3A_LjIV9RAVVU1zCAJE2hSNaPX9REGKTyQ.0ikHZoR8b0H5zkHtrrdVp%2B8RkGDr90aWutB7w%2B%2BrK0Q |
|
login.wesoft.dk/ | Name: auth0 Value: s%3A_LjIV9RAVVU1zCAJE2hSNaPX9REGKTyQ.0ikHZoR8b0H5zkHtrrdVp%2B8RkGDr90aWutB7w%2B%2BrK0Q |
|
login.wesoft.dk/ | Name: did_compat Value: s%3Av0%3Ad65494c0-6bc8-11ea-b3cb-35a80e50f585.4H18bbP8r9qkv3zZjwapj7o9d9Xa0CO5nxFWFby9x5I |
|
login.wesoft.dk/ | Name: did Value: s%3Av0%3Ad65494c0-6bc8-11ea-b3cb-35a80e50f585.4H18bbP8r9qkv3zZjwapj7o9d9Xa0CO5nxFWFby9x5I |
1 Console Messages
A page may trigger messages to the console to be logged. These are often error messages about being unable to load a resource or execute a piece of JavaScript. Sometimes they also provide insight into the technology behind a website.
Source | Level | URL Text |
---|
Indicators
This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.
cdn.auth0.com
fonts.googleapis.com
fonts.gstatic.com
login.wesoft.dk
maxcdn.bootstrapcdn.com
staging.bankafstemning.wesoft.dk
143.204.215.119
2001:4de0:ac19::1:b:3b
2a00:1450:4001:818::200a
2a00:1450:4001:81c::2003
35.156.43.152
89.233.0.116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