Submitted URL: https://fraud.rte.voila.osp.tech/fraudws/v2/fraudreports?archived=false&endDate=2020-03-11T00%3A00%3A00.000Z&startDate=2020-03-10...
Effective URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-...
Submission Tags: falconsandbox
Submission: On October 15 via api from US — Scanned from DE

Summary

This website contacted 1 IPs in 1 countries across 1 domains to perform 20 HTTP transactions. The main IP is 13.224.193.55, located in United States and belongs to AMAZON-02, US. The main domain is login.rte.voila.osp.tech.
TLS certificate: Issued by Amazon on June 20th 2021. Valid for: a year.
This is the only time login.rte.voila.osp.tech was scanned on urlscan.io!

urlscan.io Verdict: No classification

Domain & IP information

IP Address AS Autonomous System
1 1 13.32.29.104 16509 (AMAZON-02)
20 13.224.193.55 16509 (AMAZON-02)
20 1
Apex Domain
Subdomains
Transfer
21 osp.tech
fraud.rte.voila.osp.tech
login.rte.voila.osp.tech
944 KB
20 1
Domain Requested by
20 login.rte.voila.osp.tech login.rte.voila.osp.tech
1 fraud.rte.voila.osp.tech 1 redirects
20 2

This site contains no links.

Subject Issuer Validity Valid
*.rte.voila.osp.tech
Amazon
2021-06-20 -
2022-07-19
a year crt.sh

This page contains 1 frames:

Primary Page: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Frame ID: 3BCD4561039BEE0B65EA0E7432D7435C
Requests: 20 HTTP requests in this frame

Screenshot

Page Title

Authentication Service - Login

Page URL History Show full URLs

  1. https://fraud.rte.voila.osp.tech/fraudws/v2/fraudreports?archived=false&endDate=2020-03-11T00%3A00%3A00.000Z&... HTTP 302
    https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff80... Page URL

Detected technologies

Overall confidence: 100%
Detected patterns
  • jquery.*\.js(?:\?ver(?:sion)?=([\d.]+))?

Page Statistics

20
Requests

100 %
HTTPS

0 %
IPv6

1
Domains

2
Subdomains

1
IPs

1
Countries

943 kB
Transfer

929 kB
Size

3
Cookies

Page URL History

This captures the URL locations of the websites, including HTTP redirects and client-side redirects via JavaScript or Meta fields.

  1. https://fraud.rte.voila.osp.tech/fraudws/v2/fraudreports?archived=false&endDate=2020-03-11T00%3A00%3A00.000Z&startDate=2020-03-10T00%3A00%3A00.000Z HTTP 302
    https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso Page URL

Redirected requests

There were HTTP redirect chains for the following requests:

20 HTTP transactions

Resource
Path
Size
x-fer
Type
MIME-Type
Primary Request login
login.rte.voila.osp.tech/oauth2/
Redirect Chain
  • https://fraud.rte.voila.osp.tech/fraudws/v2/fraudreports?archived=false&endDate=2020-03-11T00%3A00%3A00.000Z&startDate=2020-03-10T00%3A00%3A00.000Z
  • https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudev...
8 KB
9 KB
Document
General
Full URL
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
d50ae55c57e908820347983d7b981f9da1b88f0c46374891ca5fe3b4c0226d79
Security Headers
Name Value
Content-Security-Policy default-src 'none'; font-src 'self'; style-src 'self'; script-src 'self' www.google.com www.gstatic.com; connect-src 'self'; img-src 'self'; frame-src www.google.com
Strict-Transport-Security max-age=31536000 max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block

Request headers

Host
login.rte.voila.osp.tech
Connection
keep-alive
Pragma
no-cache
Cache-Control
no-cache
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9
Accept
text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.9
Sec-Fetch-Site
none
Sec-Fetch-Mode
navigate
Sec-Fetch-User
?1
Sec-Fetch-Dest
document
Accept-Encoding
gzip, deflate, br
Upgrade-Insecure-Requests
1
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Accept-Language
de-DE,de;q=0.9

Response headers

Content-Type
text/html;charset=UTF-8
Transfer-Encoding
chunked
Connection
keep-alive
Date
Fri, 15 Oct 2021 22:37:33 GMT
Server
http-server
X-Content-Type-Options
nosniff
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Pragma
no-cache
Expires
Thu, 01 Jan 1970 00:00:00 GMT
Strict-Transport-Security
max-age=31536000 max-age=31536000; includeSubdomains
X-Frame-options
DENY
X-XSS-Protection
1; mode=block
Content-Security-Policy
default-src 'none'; font-src 'self'; style-src 'self'; script-src 'self' www.google.com www.gstatic.com; connect-src 'self'; img-src 'self'; frame-src www.google.com
RequestId
b00612e9-6c61-48d1-9c4f-987d93b00dce
Content-Language
de-DE
X-Cache
Miss from cloudfront
Via
1.1 eb83e7e264681d87a86c9b6a2159e502.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA2-C1
X-Amz-Cf-Id
GAXKcfrU5uwSUIGXHxWNuhjaTNrytmgc2Egxzr_EhikuDuSkc5FH7w==

Redirect headers

Content-Length
0
Connection
keep-alive
Date
Fri, 15 Oct 2021 22:37:33 GMT
Server
http-server
Set-Cookie
AWSALB=fRPbHkvlV+bK5GQa9c0dZMmb+Qrts6nGZkl2X4YgJMOiGGalTQT4+AwDMZ1CPZaOsavfGy0gbZ44kkXdYWGiDd478xxeIcytpKXR7+c7erNWrQFZsQzNsRLCQqHn; Expires=Fri, 22 Oct 2021 22:37:33 GMT; Path=/ AWSALBCORS=fRPbHkvlV+bK5GQa9c0dZMmb+Qrts6nGZkl2X4YgJMOiGGalTQT4+AwDMZ1CPZaOsavfGy0gbZ44kkXdYWGiDd478xxeIcytpKXR7+c7erNWrQFZsQzNsRLCQqHn; Expires=Fri, 22 Oct 2021 22:37:33 GMT; Path=/; SameSite=None; Secure JSESSIONID=BE792B80BAC4993395679C864108FD8B; Path=/; Secure; HttpOnly
X-Content-Type-Options
nosniff
X-XSS-Protection
1; mode=block
Cache-Control
no-cache, no-store, max-age=0, must-revalidate
Pragma
no-cache
Expires
0
Strict-Transport-Security
max-age=31536000 ; includeSubDomains max-age=31536000; includeSubdomains
X-Frame-Options
DENY
Referrer-Policy
no-referrer
Location
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
X-Cache
Miss from cloudfront
Via
1.1 753f415578c1ca010e51a83aef192331.cloudfront.net (CloudFront)
X-Amz-Cf-Pop
FRA56-C2
X-Amz-Cf-Id
lMjJV0rYoZKxCUIKvRHvEutoU2z84gKv6yLI0MQcwm89X0oY0bxKPQ==
style.css
login.rte.voila.osp.tech/theme/
3 KB
3 KB
Stylesheet
General
Full URL
https://login.rte.voila.osp.tech/theme/style.css
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
c4696fb980697c9ad9b7fb66ea7c35f99ab052ab72aff826238b5caeeba216c9
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 eb83e7e264681d87a86c9b6a2159e502.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
c1b375d5-9e76-4029-9277-f4f8267526f7
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
text/css;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
2611
X-Amz-Cf-Id
m7DtlGguN46wsW5QNB6XVtdATN23gV-rEEGm_HSXXboTJFHXrXQw-Q==
jquery.min.js
login.rte.voila.osp.tech/static/js/
95 KB
96 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/jquery.min.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
668b046d12db350ccba6728890476b3efee53b2f42dbb84743e5e9f1ae0cc404
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 0e75d8f2d484ce463fc04f5c422aa179.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
77be13f2-ee99-4f3a-baac-d6d17c7e6bb6
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
97163
X-Amz-Cf-Id
9vh8teOZ-HrDbf-v1X2CFMqFxHaMl_A60I6EvU-guZtZgqAN_jA4eg==
common.js
login.rte.voila.osp.tech/static/js/
706 B
1 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/common.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
9fea2e66c2df199ae1b75409997db9e2d22e100c13b6a3517388cc1a0fdb6c50
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
c80cff97-29c2-496d-a536-8a976e1c1c74
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
706
X-Amz-Cf-Id
eUnuGuTubCjkpmVenzpGrivufg654W-Y9VQE52zmR3qRFj2iRKjenQ==
dependency.js
login.rte.voila.osp.tech/static/js/
377 B
1 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/dependency.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
4adb462a061f7997139d82a3e544bb2cdb8d8f632bf5c9308b660f8a4041171a
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
1e26673e-3e5d-4b01-8cd1-c7ee290265ed
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
377
X-Amz-Cf-Id
qe4WbNrrauB6bN3W9JmiMgCPwYF-ftoa52m_UEOu4LWxVvUZxYB6Ag==
toggle.js
login.rte.voila.osp.tech/static/js/
338 B
1009 B
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/toggle.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
39d481f5eb9d3f57a70ea446cdbc7d5a65e0b8f0aaeb6841b9a192a54a823cde
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 5076c8187f430eebe5e26fc594d6125a.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
d170175e-1d25-494c-8f7d-e77fcd8eb516
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
338
X-Amz-Cf-Id
jXDT636tSAftl4m5Rd4xVA2ygQTV8mRWj9au8Z4xM1d38ro0MPJ0ng==
scripts.js
login.rte.voila.osp.tech/theme/
37 B
707 B
Script
General
Full URL
https://login.rte.voila.osp.tech/theme/scripts.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
a249cbc9c4b8be4e0bb098c2a8fc1d04a8e87299a9e49c5f07b2eac481dbf2d6
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
4517fbc8-268e-479b-9ec0-5dd62c73e9b6
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
37
X-Amz-Cf-Id
ukAUkp1jUbfsvmZmjjsXfPnLRdEbvxS1giF4Pz_lZePlkkNPx9ohZw==
autologinLoader.js
login.rte.voila.osp.tech/static/js/
88 B
758 B
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/autologinLoader.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
32bccc7ecde490b21504b5f9682f4870a729d4ec0becdd778ee5be6d14d8b2d5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
b9459e2e-4310-4e5c-a906-3aa720be92d3
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
88
X-Amz-Cf-Id
0YT0iXY9DZ3nLp9pFctT5j7WjoNnX7je_HVsWJkdlPwzUrkBRqlQXA==
loginForm.js
login.rte.voila.osp.tech/static/js/
1 KB
2 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/loginForm.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
cd50b00f36bd5a482e2bf47ecbe9ab1954494d6481b7a374d0209ee9e598fcf5
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 eb83e7e264681d87a86c9b6a2159e502.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
56925baa-31af-4162-83ef-b48306434e36
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
1424
X-Amz-Cf-Id
HQZitZQUriANL5OSfDjWYgvu43W_fw-iY2Xa_8K1by3Zb5k0KzN9Aw==
login.js
login.rte.voila.osp.tech/static/js/
234 B
905 B
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/login.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
104c95a597b927f45c24451c35d6c75f53398a64f4466a5e5a87087a50795930
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
5c3944a6-d999-474f-9d00-71b41cb33029
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
234
X-Amz-Cf-Id
C-rYi94pYJ7sTT-W6lf_4nV0xz7BdQFM0kD5t2_85lg5XWelz1zRxg==
appbar-logo.png
login.rte.voila.osp.tech/theme/img/
126 B
784 B
Image
General
Full URL
https://login.rte.voila.osp.tech/theme/img/appbar-logo.png
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
bf9ab9263e52cb1e92b4f766d5f76f02c54e8560f260cdd4c8f7bc5d0e9d6c7f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
d0e8ad66-7f8c-44f2-8658-86689f551f99
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
image/png;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
126
X-Amz-Cf-Id
jINKa-Zkf_5643lkv8VUwh00a5M8wLaPMw12VNkd-D76vpsUl7AkCA==
appbar-icon.png
login.rte.voila.osp.tech/theme/img/
126 B
784 B
Image
General
Full URL
https://login.rte.voila.osp.tech/theme/img/appbar-icon.png
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
bf9ab9263e52cb1e92b4f766d5f76f02c54e8560f260cdd4c8f7bc5d0e9d6c7f
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
8c3f3944-b4d7-496d-9fb1-0ead5321a536
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
image/png;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
126
X-Amz-Cf-Id
a2LNphSdY5GIQjuUa0VRM9CyAgmqoMuscuklMRnirXgql_pMZKFDRg==
logo-large.png
login.rte.voila.osp.tech/theme/img/
57 KB
58 KB
Image
General
Full URL
https://login.rte.voila.osp.tech/theme/img/logo-large.png
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
09f411964021ceb88f2dcac874955f2e65fa08819dc5fe8386096fbe56d4ad78
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:36 GMT
Via
1.1 eb83e7e264681d87a86c9b6a2159e502.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
dec73f03-a9b1-4ed4-be89-c7a58c6f018c
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
image/png;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
58551
X-Amz-Cf-Id
P08_gOSa651OYv7RezW_4jYhGyPsb4YJwtPrMda8qAbSP4_kuAqPkQ==
aeris.min.css
login.rte.voila.osp.tech/theme/dist/css/
366 KB
367 KB
Stylesheet
General
Full URL
https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/theme/style.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
409385b31cda6db8f7cefc222d5820202b836a228e29f1422b2153926405a731
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
text/css,*/*;q=0.1
Cache-Control
no-cache
Sec-Fetch-Dest
style
Referer
https://login.rte.voila.osp.tech/theme/style.css
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/theme/style.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:34 GMT
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
f2ac3d0f-07cb-4b70-9163-c1fabf0ac4d8
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
text/css;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
374663
X-Amz-Cf-Id
miehjmpEXaAj6n3IfTAud0PYJ0iq4LdouuE2gcwiqx5Dhq6lzaPuuA==
aeris.min.js
login.rte.voila.osp.tech/theme/dist/js/
92 KB
93 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/theme/dist/js/aeris.min.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/static/js/dependency.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
ded16dae09495d439814acd7f4160f939fb67589be71fcc22c7908bbe84499e4
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 eb83e7e264681d87a86c9b6a2159e502.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
f5849ee0-923c-412d-b304-273ff2ab7cbe
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
94427
X-Amz-Cf-Id
NHZzafzL5F41EsNRmTO36pq3mSEn8A7AnjO0eWWN9uGmBsHASASx3g==
ifvisible.min.js
login.rte.voila.osp.tech/static/js/
4 KB
4 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/ifvisible.min.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/static/js/dependency.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
da87c0f1e49af529768f5ff80dccc70aa91b12d23177374896c3a3901c8fe710
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
bf7d2f53-2a99-42a6-b0ff-980e0d5b836d
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
3727
X-Amz-Cf-Id
Pme5ooL7h-bS8THNmzmniUs3IVnS7id9MatsGH_8PxVyhrvSJrSxYw==
autologin.js
login.rte.voila.osp.tech/static/js/
504 B
1 KB
Script
General
Full URL
https://login.rte.voila.osp.tech/static/js/autologin.js
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/static/js/dependency.js
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
b3b97731fd7f5b25f35461c571e958f284a4692360eecd2a684e7d4721c5d270
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
script
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/oauth2/login?client_id=fraudedge&response_type=code&state=1634337453248-ff809276-92b6-419e-90e4-30bf9cd9c226&scope=fraudws+openid+profile+fraudrules+banners+fraudeval&redirect_uri=https%3A%2F%2Ffraud.rte.voila.osp.tech%2Fverify.pandasso
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
f461e441-43b1-4793-aefb-35fdc67d55e0
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/javascript;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
504
X-Amz-Cf-Id
MBEVgOrFcIryiw_HOI8apvbbgL97HrBqmcv1pQQ4pIBu8X6JJFDjNA==
backdrop.jpg
login.rte.voila.osp.tech/theme/img/
154 KB
154 KB
Image
General
Full URL
https://login.rte.voila.osp.tech/theme/img/backdrop.jpg
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/theme/style.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
777d3e97c6fdfcdf405f03facb86e2b946006dedc86251c8db0cdfc1fb7d3ab3
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
no-cors
Accept
image/avif,image/webp,image/apng,image/svg+xml,image/*,*/*;q=0.8
Cache-Control
no-cache
Sec-Fetch-Dest
image
Referer
https://login.rte.voila.osp.tech/theme/style.css
Connection
keep-alive
Accept-Language
de-DE,de;q=0.9
Referer
https://login.rte.voila.osp.tech/theme/style.css
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 8f20db43ba7579b7216cf908572d5054.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
276aa6ce-2be9-4b72-9f3e-2ea47ad6f015
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
image/jpeg;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
157540
X-Amz-Cf-Id
snRUawg0AjpgKxOC4vODcgtviaRUmPRNfwOCs_U6HI932YtV3n9ygw==
SourceSansPro-Regular.woff2
login.rte.voila.osp.tech/theme/dist/fonts/
74 KB
75 KB
Font
General
Full URL
https://login.rte.voila.osp.tech/theme/dist/fonts/SourceSansPro-Regular.woff2
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
d442df0c895f893906d5e305cdea2b66b1ba86706831c73e60816bf7e62450ea
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Origin
https://login.rte.voila.osp.tech
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
font
Referer
https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Connection
keep-alive
Referer
https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Origin
https://login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:35 GMT
Via
1.1 f046bfa1468bb4385e357c8c9128cf51.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
8c9cdff7-e206-44a3-89f9-815e0e33c567
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/octet-stream;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
75796
X-Amz-Cf-Id
QcO1eNbs7k25ntTNYuaWyqs-e5pxXoEuDSqN4at141792mjV_xxPHw==
SourceSansPro-Semibold.woff2
login.rte.voila.osp.tech/theme/dist/fonts/
73 KB
74 KB
Font
General
Full URL
https://login.rte.voila.osp.tech/theme/dist/fonts/SourceSansPro-Semibold.woff2
Requested by
Host: login.rte.voila.osp.tech
URL: https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Protocol
HTTP/1.1
Security
TLS 1.3, , AES_128_GCM
Server
13.224.193.55 , United States, ASN16509 (AMAZON-02, US),
Reverse DNS
server-13-224-193-55.fra2.r.cloudfront.net
Software
http-server /
Resource Hash
1afdc3dfd777743e61bd5078cdc6811eccb3d1a828f12e21c4e2fa7d38d207c2
Security Headers
Name Value
Strict-Transport-Security max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff

Request headers

Pragma
no-cache
Sec-Fetch-Site
same-origin
Origin
https://login.rte.voila.osp.tech
Accept-Encoding
gzip, deflate, br
Host
login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36
Sec-Fetch-Mode
cors
Accept
*/*
Cache-Control
no-cache
Sec-Fetch-Dest
font
Referer
https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Connection
keep-alive
Referer
https://login.rte.voila.osp.tech/theme/dist/css/aeris.min.css
Origin
https://login.rte.voila.osp.tech
Accept-Language
de-DE,de;q=0.9
User-Agent
Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/93.0.4577.63 Safari/537.36

Response headers

Date
Fri, 15 Oct 2021 22:37:36 GMT
Via
1.1 c28c128e9402fb070daca09bab68490a.cloudfront.net (CloudFront)
X-Content-Type-Options
nosniff
Last-Modified
Tue, 29 Jun 2021 09:41:57 GMT
Server
http-server
X-Amz-Cf-Pop
FRA2-C1
RequestId
4f1e25c3-1c2a-44e6-a687-6ad6ec583b19
Strict-Transport-Security
max-age=31536000; includeSubdomains
X-Cache
Miss from cloudfront
Content-Type
application/octet-stream;charset=UTF-8
Connection
keep-alive
Accept-Ranges
bytes
Vary
Origin Access-Control-Request-Method Access-Control-Request-Headers
Content-Length
75208
X-Amz-Cf-Id
YAwctwYWFTOcvP_1YGKjVqZPOu1KW_XbStkq3tejsOW_0qHMc9fkLg==

Verdicts & Comments Add Verdict or Comment

13 JavaScript Global Variables

These are the non-standard "global" variables defined on the window object. These can be helpful in identifying possible client-side frameworks and code.

object| onbeforexrselect boolean| originAgentCluster function| $ function| jQuery function| isRfGun function| getCurrentScriptPath function| loadJsFile object| appsData object| jQuery112406541050735673115 object| ifvisible function| initializeAutologin function| formNotValid function| initializeLoginForm

3 Cookies

Domain/Path Name / Value
fraud.rte.voila.osp.tech/ Name: AWSALB
Value: fRPbHkvlV+bK5GQa9c0dZMmb+Qrts6nGZkl2X4YgJMOiGGalTQT4+AwDMZ1CPZaOsavfGy0gbZ44kkXdYWGiDd478xxeIcytpKXR7+c7erNWrQFZsQzNsRLCQqHn
fraud.rte.voila.osp.tech/ Name: AWSALBCORS
Value: fRPbHkvlV+bK5GQa9c0dZMmb+Qrts6nGZkl2X4YgJMOiGGalTQT4+AwDMZ1CPZaOsavfGy0gbZ44kkXdYWGiDd478xxeIcytpKXR7+c7erNWrQFZsQzNsRLCQqHn
fraud.rte.voila.osp.tech/ Name: JSESSIONID
Value: BE792B80BAC4993395679C864108FD8B

Security Headers

This page lists any security headers set by the main page. If you want to understand what these mean and how to use them, head on over to this page

Header Value
Content-Security-Policy default-src 'none'; font-src 'self'; style-src 'self'; script-src 'self' www.google.com www.gstatic.com; connect-src 'self'; img-src 'self'; frame-src www.google.com
Strict-Transport-Security max-age=31536000 max-age=31536000; includeSubdomains
X-Content-Type-Options nosniff
X-Frame-Options DENY
X-Xss-Protection 1; mode=block