URL: http://144.202.2.120/?questions%2F55977029%2Ffacet-wrap-and-fill-in-dot-plot
Submission Tags: falconsandbox
Submission: On November 21 via api from US

Summary

This website contacted 1 IPs in 1 countries across 0 domains to perform 2 HTTP transactions. The main IP is 144.202.2.120, located in Piscataway, United States and belongs to AS-CHOOPA, US. The main domain is 144.202.2.120.
This is the only time 144.202.2.120 was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
2 144.202.2.120 20473 (AS-CHOOPA)
2 1
Apex Domain
Subdomains
Transfer
2 0
Domain Requested by
2 0

This site contains links to these domains. Also see Links.

Domain
go.microsoft.com
Subject Issuer Validity Valid

This page contains 1 frames:

Primary Page: http://144.202.2.120/?questions%2F55977029%2Ffacet-wrap-and-fill-in-dot-plot
Frame ID: BE88223471B06850097A4CD4750DB202
Requests: 2 HTTP requests in this frame

Screenshot


Detected technologies

Overall confidence: 100%
Detected patterns
  • headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i

Overall confidence: 100%
Detected patterns
  • headers server /^(?:Microsoft-)?IIS(?:\/([\d.]+))?/i

Page Statistics

2
Requests

0 %
HTTPS

0 %
IPv6

0
Domains

0
Subdomains

1
IPs

1
Countries

98 kB
Transfer

97 kB
Size

0
Cookies

Redirected requests

There were HTTP redirect chains for the following requests:

2 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request /
144.202.2.120/
694 B
918 B
Document
General
Full URL
http://144.202.2.120/?questions%2F55977029%2Ffacet-wrap-and-fill-in-dot-plot
Protocol
HTTP/1.1
Server
144.202.2.120 Piscataway, United States, ASN20473 (AS-CHOOPA, US),
Reverse DNS
144.202.2.120.vultr.com
Software
Microsoft-IIS/8.5 /
Resource Hash
d94e384271810bfc3184dc31122fb459419e48ef82bf6853242229d4c2488e10

Request headers

Host
144.202.2.120
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Accept-Encoding
gzip, deflate
Accept-Language
en-US
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Content-Type
text/html
Last-Modified
Fri, 14 Feb 2020 05:39:08 GMT
Accept-Ranges
bytes
ETag
"c12fcf13f9e2d51:0"
Server
Microsoft-IIS/8.5
Date
Sat, 21 Nov 2020 23:31:10 GMT
Content-Length
694
iis-85.png
144.202.2.120/
96 KB
97 KB
Image
General
Full URL
http://144.202.2.120/iis-85.png
Requested by
Host: 144.202.2.120
URL: http://144.202.2.120/?questions%2F55977029%2Ffacet-wrap-and-fill-in-dot-plot
Protocol
HTTP/1.1
Server
144.202.2.120 Piscataway, United States, ASN20473 (AS-CHOOPA, US),
Reverse DNS
144.202.2.120.vultr.com
Software
Microsoft-IIS/8.5 /
Resource Hash
9d0f3359cb32400f3763222dfa3b429ef85b778186a91d7c15eeca749ad285f5

Request headers

Referer
http://144.202.2.120/?questions%2F55977029%2Ffacet-wrap-and-fill-in-dot-plot
User-Agent
Mozilla/5.0 (Macintosh; Intel Mac OS X 10_14_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/83.0.4103.61 Safari/537.36

Response headers

Date
Sat, 21 Nov 2020 23:31:10 GMT
Last-Modified
Fri, 14 Feb 2020 05:39:08 GMT
Server
Microsoft-IIS/8.5
Accept-Ranges
bytes
ETag
"c12fcf13f9e2d51:0"
Content-Length
98757
Content-Type
image/png

Verdicts & Comments Add Verdict or Comment

5 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| ontransitionrun object| ontransitionstart object| ontransitioncancel object| trustedTypes boolean| crossOriginIsolated

0 Cookies

Indicators

This is a term in the security industry to describe indicators such as IPs, Domains, Hashes, etc. This does not imply that any of these indicate malicious activity.

144.202.2.120
9d0f3359cb32400f3763222dfa3b429ef85b778186a91d7c15eeca749ad285f5
d94e384271810bfc3184dc31122fb459419e48ef82bf6853242229d4c2488e10